Server Component Details | Group: io.mosip.hotlist ---- Artifact: hotlist-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.admin ---- Artifact: admin-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-auditmanager-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-auth-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.biosdk ---- Artifact: biosdk-services ---- version: 1.2.0.1 ---- Commit ID: 2a87b3b Group: io.mosip.idrepository ---- Artifact: credential-service ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: credential-request-generator ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.datashare ---- Artifact: data-share-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.authentication ---- Artifact: authentication-service ---- version: 1.2.1.0 ---- Commit ID: 86640e4 Group: io.mosip.authentication ---- Artifact: authentication-internal-service ---- version: 1.2.1.0 ---- Commit ID: 86640e4 Group: io.mosip.authentication ---- Artifact: authentication-otp-service ---- version: 1.2.1.0 ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: id-repository-identity-service ---- version: 1.2.2.0 ---- Commit ID: 821bac2 Group: io.mosip.kernel ---- Artifact: kernel-keymanager-service ---- version: 1.3.0-beta.3 ---- Commit ID: d748ead Group: io.mosip.kernel ---- Artifact: kernel-masterdata-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-notification-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-otpmanager-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.pms ---- Artifact: partner-management-service ---- version: 1.3.0-SNAPSHOT ---- Commit ID: d748ead Group: io.mosip.pms ---- Artifact: policy-management-service ---- version: 1.3.0-SNAPSHOT ---- Commit ID: d748ead Group: io.mosip.registrationprocessor ---- Artifact: registration-processor-registration-status-service ---- version: 1.2.0.2 ---- Commit ID: 50926c8 Group: io.mosip.resident ---- Artifact: resident-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-syncdata-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: id-repository-vid-service ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.esignet ---- Artifact: esignet-service ---- version: 1.4.1 ---- Commit ID: ab88802 | End Points used |
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?policyGroupName=Group_A
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=928382
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?model={model}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?make={make}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/{policyGroupId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}&sortType={sortType}&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?orgName=Org_A&policyGroupName=InvalidGroup123
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&certificateId=fd0e8be0-9499-448e-9b85-06d5649c3f0e
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}/group/{policygroupId}/publish
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?partnerId=invalid_partnerid
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?apiKeyLabel=InvalidAPIKey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/oauth/client
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?orgName=Org@@!!$$.
Domain: api-internal.qa-core.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/internal/useridPwd
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?sbiId=PMS-SBI
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/trust-chain-certificates?pageNo=0&pageSize=8&issuedTo=PMS_API_CA&issuedBy=PMS_API_CA
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?certificateUploadStatus=not_uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/users/{userId}/notifications-seen-timestamp
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=desc&certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?expiryPeriod=15
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?expiryPeriod=10
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/devicedetails/map/remove
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/{partnerId}/policy-group
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?mispLicenseKeyName=Key@@!!$$.
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/pms-111999/contact/add
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications/{notificationId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=-1&sortType=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=apikey&apiKeyName=%2APMS121
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=orgName&sortType=ASC&pageNo=0&pageSize=8&orgName=partner
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?emailAddress=2t63t@@@
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?status=activated
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey/request/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v2/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortType=3@@#&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/Tech-1233/policy/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?status=ACTIVE
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceId={deviceId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=123456
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageNo=111111
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerType={partnerType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?policyGroupName={policyGroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=desc&pageSize=8&partnerType=Auth
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/system-config
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=orgName&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?model={model}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/trust-chain-certificates
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/auth-partners-policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyGroupName=testmosip12121
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?pageSize=-5
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageNo=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?policyName=""
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/1hhggg9/policy/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&partnerDomain=AUTH
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?partnerId=%252APMS
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyName=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?orgName=%2APMS-1100
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=4&issuedTo=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=asc&certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?apiKeyLabel=s
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortType=&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/exists
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/{ftmId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&ftmId=342342
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/{sbiId}/devices
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/policy-groups
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?sortFieldName=mispLicenseKeyName&sortType=desc
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?sortType=asc
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageSize=8&isActive=true
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/partner-certificates-details
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/pms-111999
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/all
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/new
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misps/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=partnerId&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?pageNo=abc&pageSize=2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=_partnerID&sortType=asc&pageNo=1&pageSize=1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?requestDetails={requestDetails}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?orgName=UnknownOrg
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/apikey/request
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/upload
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerType=dfdgd
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?status=deactivated
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?pageNo=0&pageSize=2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&policyName=PMS-test
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyGroupName=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/certificate-data
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/devicedetails/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?policyName=P@!!cY$$.
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/deviceType/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=ab-102-13881
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?policyName=Gr@Up@!!$$.
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?policyGroupName=""
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=-22
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=16&expiryDate=881718821
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/search
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=16&expiryDate=07-04-2025
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/users/user-consent
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?partnerId=pms-111555
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/oauth/client/{client_id}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/partnertype/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=weekly&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/ca/upload
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?policyGroupName=-12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceType={deviceType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=MOSIP_PMS
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerId=bcbcb
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/uploadcertificate
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?pageNo=0&pageSize=abc
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyGroupName={policyGroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sbiId={sbiId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/getPartnerCertificate/{ftpChipDetailId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?make={make}&model={model}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageNo=2&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?orgName=Par@@!!$$.
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?policyName=Policy_X
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/deviceSubType/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyId={policyId}&policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/roles
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/certificate
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerId={partnerId}&requestDetails={requestDetails}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=_%2ASBI
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sbiVersion={sbiVersion}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortType=asc&certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?emailAddress=454646
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerType=2233ddd
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?pageNo=10089&pageSize=0
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/{sbiId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&sbiId=12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?partnerId=pms-111999
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?policyGroupName=
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?mispLicenseKeyName=INVALID_KEY
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?pageNo=-1&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?policyGroupName=Invalid_policygroupname
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}/group/{policygroupId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&ftmId=12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyId={policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misps/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?isActive=false
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?orgName=PMS
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/Tech-1231234
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sbiId={sbiId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?orgName=123@1sse
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?sortFieldName=mispLicenseKeyName&sortType=random
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyDescription={policyDescription}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v2
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}/partner/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?expiryPeriod=30
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?sortFieldName=mispLicenseKeyName&sortType=asc
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/deviceType/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyName=testmosip1212
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=8&certificateId=777apple123
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=asc&pageSize=8&partnerType=Auth
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey/request/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?status=deactivated
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&partnerType=FTM_Provider
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/config/{key}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/clientidsecretkey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?apiKeyLabel={apiKeyLabel}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/pms-111999/policy/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageSize=-12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/trust-chain-certificates/4e6292d7-7604-44e3-ab4f-58a18c53dc9e/certificateFile
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?orgName=ORGName
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/email/verify
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/{deviceId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationStatus=active&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=16&issuedBy=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?pageSize=0
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/apikey/{apiKey}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?make={make}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/Tech-123
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/pms-111557/policy-group
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=a2a33
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageNo=-22&pageSize=2
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyGroupName={policyGroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?policyName=Invalid_Policy
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerId=-dndn333
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/policy/{mappingkey}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/MOVP-AUTOMATION/policy/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=-4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageNo=1&pageSize=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=07-04-2025
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/pms-111999/generate/apikey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyId={policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=07-04-2025
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&apiKeyName=12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/pms-111555/policy/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?sortFieldName=@#$%
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?mispLicenseKeyName=License_A
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceSubType={deviceSubType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?policyName=PMS-test
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/{deviceDetailId}/approval
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?make={make}&model={model} | |||||
|---|---|---|---|---|---|---|---|---|
Server Errors No server errors | ||||||||
Captcha Enabled false | ||||||||
| Partner Management Service API Test ---- Report Date: 2025-11-10 ---- Tested Environment: qa-core ---- Commit Id is: 773ae716 & Branch Name is:release-1.3.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| CreatePolicyGroup | 20 | 20 | 0 | 0 | 0 | 0 | 00:00:04 | |
| GetPolicyGroup | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePolicyGroup | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivatePolicyGroupBeforePolicyCreation | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DefinePolicy | 29 | 29 | 0 | 0 | 0 | 0 | 00:00:06 | |
| DefineMISPPolicy | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DefineDataSharePolicy | 25 | 25 | 0 | 0 | 0 | 0 | 00:00:05 | |
| UpdatePolicy | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePolicyStatus | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PublishPolicy | 12 | 12 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllActivePolicyGroups | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPolicy | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SearchPolicy | 21 | 21 | 0 | 0 | 0 | 0 | 00:00:02 | |
| PrintPartner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificatePrintPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadPartnerCertificatePrintPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePrintPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPrintPartnerDetails | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerWithoutPartnerRegister | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedPartnerIdBeforePartnerCreate | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreatePartner | 20 | 20 | 0 | 0 | 0 | 0 | 00:00:05 | |
| MISPPartnerV3 | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:03 | |
| MISPPartnerV3NegativeScenarios | 33 | 33 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCertificateMISPCASUBCA | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadMISPPartnerCertificate | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:11 | |
| LinkPolicyGroupToMISPPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| LinkPolicyGroupToMISPPartnerNegTC | 21 | 21 | 0 | 0 | 0 | 0 | 00:00:01 | |
| MISPPartnerExists | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| MISPPartnerExistsNegTC | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListofPartnersAssociatedwithLoggedinUser | 10 | 10 | 0 | 0 | 0 | 0 | 00:00:11 | |
| GetListofPartnersAssociatedwithLoggedinUserNegSce | 10 | 10 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreatePartner_Online_Verification_Partner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerWithoutPartnerCertifcates | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| VerifyPartnersEmail | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerExpiringCertificateBeforeCertificateUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificate | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:04 | |
| GetAllCertificateBeforeCACertificateUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalPartnerCertificatesBeforeCertificateUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadPartnerCertificate | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:12 | |
| GetPartnerCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePartner | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificate_Online_Verification_Partner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:02 | |
| UploadPartnerCertificate_Online_Verification_Partner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:03 | |
| GetPartnerDetails_Online_Verification_Partner | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerCertificate_Online_Verification_Partner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedPartnerId | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedPartnerIdWithoutAuthentication | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerBeforePolicyMapping | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRequestedPolicyBeforeMapping | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AddAdditionalContact | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| partnerPolicyMapping | 14 | 14 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AddBioExtractors | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingKey | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingKey | 10 | 10 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRequestedPolicy | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRequestedPolicyAuthvalidations | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedAuthPartnerPolicy | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedAuthPartnerPolicyAuthValidations | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerBeforeApikeyGenerated | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GenerateApiKey | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ActivateDeactivatePartnerApiKey | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| InsertDBData | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerAfterDeactive | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllPartnerPolicyRequest | 16 | 16 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllPartnerPolicyRequestNegativeScenarios | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfPartners | 35 | 35 | 0 | 0 | 0 | 0 | 00:00:18 | |
| GetDetailsOfPartner | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfPolicies | 21 | 21 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfPoliciesRequest | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClientBeforeOIDCCreation | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OAuthClient | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:09 | |
| GetAllOauthClient | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateOAuthClient | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClient | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClientWithoutAuthentication | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateOIDCClient | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClientAfterDeactivateOfOIDC | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetConfiguration | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetUserConsentBeforeConsentGiven | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| saveUserConsent | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetUserConsent | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalPartnerCertificates | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreatePartner_MISP_Provider | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificate_MISP_Provider | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadPartnerCertificate_MISP_Provider | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:10 | |
| GetPartnerDetails_MISP_Provider | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerCertificate_MISP_Provider | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateDeviceDetail | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectDeviceDetail | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveDeviceDetail | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateDeviceDetail | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeviceDetailsFilter | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| createSearchDeviceType | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:01 | |
| createSearchDeviceDetails | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllSBIBeforeAddingSBI | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SaveSecureBiometricInterfaceCreateDto | 10 | 10 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectSecureBiometricInterface | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveSecureBiometricInterface | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateSecureBiometricInterface | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| createSearchSecureBiometric | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedDeviceProviderIds | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedDeviceProviderIdsNegativeScenarios | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateSBIID | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetSbiDetailsList | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeviceTypeFilter | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeviceSubTypeFilter | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SaveDeviceDetails | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllSBI | 18 | 18 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ServiceToFilterSBI | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| MapDeviceWithSBI | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RemoveMapDeviceWithSBI | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbi | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbiNegativeScenarios | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingDeviceToSbi | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingDeviceToSbiwhichisRejected | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingDeviceToSbiNegativeScenarios | 32 | 32 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbiwhichisRejected | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllDeviceListMappedWithSbi | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllDeviceListMappedWithSbiNegativeScenarios | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateSBIwhichisPendingforApproval | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnersPolicy | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllPolicyGroup | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:04 | |
| CreateSearchPolicyGroup | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PolicyGroupFilter | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetValueForConfigKey | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PartnerFilter | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SearchPartnerApiKey | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:03 | |
| SearchPartnerApiRequestKey | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:02 | |
| PartnerApiKeyRequestFilter | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateSearchPartnerType | 19 | 19 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedFtmProvider | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedFtmProviderNegativeScenarios | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListAllFTMChipNegativeScenarios | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateFtmChipDetails | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateFtpChipDetail | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteNegativeScenariosBeforeUploadCert | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtmwhichisPendingforCertUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteforPendingforCertUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCertificateOfFtpChip | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtmwhichisPendingforApproval | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveFTMChipDetail | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectFtpChipDetail | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetFTPChipDetail | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListAllFTMChip | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacte | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteNegativeScenarios | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfFtmChip | 15 | 15 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfFtmChipNegativeScenarios | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllSBINegativeScenarios | 14 | 14 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllDevice | 25 | 25 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetCountOfFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllSystemConfigs | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRootCertificate | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfApiKey | 17 | 17 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DownloadRootCertificate | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GenerateMISPPartnerLicense | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GenerateMISPPartnerLicenseNegativeScenarios | 20 | 20 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetMISPPartnerLicense | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetMISPPartnerLicenseNegTC | 23 | 23 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetMISPPartnerLicenseByPartnerId | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetMISPPartnerLicenseByPartnerIdNegTC | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SearchMispLicense | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| FilterMispLicense | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerApiKeyRequest | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetBioExtractors | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateBioExtractors | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| MapPartnerAndPolicytoCredentialType | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPolicyforMappedPartnerAndCredentialtype | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetRoles | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ActivateDeactivatePartner | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetApiKeyRequests | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuditLogGenerateApiKey | 1 | 1 | 0 | 0 | 0 | 0 | 00:01:08 | |
| GetPolicyForApiKey | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePolicyAgainstApiKey | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuditLogPartnerApiKey_ | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:33 | |
| UpdatePolicyGroupForPartner | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuditLogUpdatePolicyGroupForPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:35 | |
| DBValidator | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RegenerateMISPPartnerLicense | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RegenerateMISPPartnerLicenseNegTC | 19 | 19 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateMISPPartnerLicense | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateMISPPartnerLicenseNegTC | 10 | 10 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateDevice | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateDeviceNegativeScenarios | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateSBIWithAssociatedDevices | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateSBIWithAssociatedDevicesNegativeScenarios | 20 | 20 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbiwhenSBIisDeactivated | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtmNegativeScenarios | 18 | 18 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteAfterDeactiveFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivatePolicy | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivatePolicyGroup | 17 | 17 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllNotifications | 40 | 40 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DismissNotificationNegativeScenarios | 19 | 19 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateNotificationSeenTimestamp | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateNotificationSeenTimestampNegativeScenarios | 18 | 18 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetNotificationsSeenTimestamp | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetNotificationsSeenTimestampNegativeScenarios | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerExpiringCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerExpiringCertificateNegativeScenarios | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetRootIntermediateExpiringCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetRootIntermediateExpiringCertificateNegativeScenarios | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerV2 | 16 | 16 | 0 | 0 | 0 | 0 | 00:00:03 | |
| GetAllApiKeyForAuthPartnerV2NegativeScenarios | 14 | 14 | 0 | 0 | 0 | 0 | 00:00:01 | |
| Total | 1,266 | 1,266 | 0 | 0 | 0 | 0 | 00:05:22 | |
| TestCase Number | TestCase Description | Execution Time (HH:MM:SS) |
|---|---|---|
| CreatePolicyGroup — Passed | ||
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_11 | Creating a PolicyGroup for draft policy | 00:00:01 |
| TC_PMS_definePolicyGroup_10 | Creating a PolicyGroup for published policy | 00:00:01 |
| TC_PMS_definePolicyGroup_11 | Creating a PolicyGroup for draft policy | 00:00:01 |
| TC_PMS_definePolicyGroup_09 | Creating a PolicyGroup for deactivate policy | 00:00:01 |
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:02 |
| TC_PMS_definePolicyGroup_02 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_08 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_20 | Creating a PolicyGroup for MISP PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_04 | Creating a Policy Group | 00:00:01 |
| TC_PMS_definePolicyGroup_05 | Creating a Policy Group | 00:00:01 |
| TC_PMS_definePolicyGroup_06 | Creating a policy group with missing request time | 00:00:01 |
| TC_PMS_definePolicyGroup_03 | Creating a PolicyGroup with invalid request time | 00:00:01 |
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_07 | Creating a policy group | 00:00:01 |
| Pms_DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid | Creating a PolicyGroup | 00:00:01 |
| Pms_DefinePolicyGroup_create_then_deactivateAll_Valid_Smoke_pms_sid | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:01 |
| GetPolicyGroup — Passed | ||
| TC_PMS_getPolicyGroup_01 | Retrieve Parter Policy Group | 00:00:01 |
| TC_PMS_getPolicyGroup_02 | Retrieve Parter Policy Group with invalid PolicyGroupId | 00:00:01 |
| UpdatePolicyGroup — Passed | ||
| TC_PMS_updatePolicyGroup_02 | Update Policy Group with valid details | 00:00:01 |
| TC_PMS_updatePolicyGroup_04 | Update Policy Group while keeping PolicyGroupID parameter as invalid | 00:00:01 |
| TC_PMS_updatePolicyGroup_05 | Update Policy Group while keeping PolicyGroupID parameter as missing and filter data in descending order | 00:00:01 |
| TC_PMS_updatePolicyGroup_07 | Update Policy Group while keeping isActive parameter as missing | 00:00:01 |
| TC_PMS_updatePolicyGroup_06 | Update Policy Group while keeping Name parameter as missing | 00:00:01 |
| TC_PMS_updatePolicyGroup_03 | Update Policy Group as Activate with valid details | 00:00:01 |
| TC_PMS_updatePolicyGroup_01 | Update Policy Group as Deactivate with valid details | 00:00:01 |
| DeactivatePolicyGroupBeforePolicyCreation — Passed | ||
| TC_PMS_DeactivatePolicyGroupBeforePolicyCreation_01 | Deactivate Policy Group before policy is created | 00:00:01 |
| DefinePolicy — Passed | ||
| TC_PMS_definePolicy_29 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_31 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_28 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_30 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_06 | Define Policy for invalid AuthTypeToken | 00:00:01 |
| TC_PMS_definePolicy_05 | Define Policy For invalid AuthTypeToken | 00:00:01 |
| TC_PMS_definePolicy_03 | Define Policy for auth token type null | 00:00:01 |
| TC_PMS_definePolicy_04 | Define policy for authtoken type policy | 00:00:01 |
| TC_PMS_definePolicy_08 | Define Policy for AuthTypeToken space | 00:00:01 |
| TC_PMS_definePolicy_27 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_02 | Get API key for deactivated SID | 00:00:01 |
| TC_PMS_definePolicy_01 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_10 | Define Policy with same policyname | 00:00:01 |
| TC_PMS_definePolicy_19 | Define Policy without authtoken type | 00:00:01 |
| TC_PMS_definePolicy_18 | Define policy without authtype | 00:00:01 |
| TC_PMS_definePolicy_16 | Define policy withput input parameter | 00:00:01 |
| TC_PMS_definePolicy_17 | Define policy | 00:00:01 |
| TC_PMS_definePolicy_15 | Define policy missing input parameter | 00:00:01 |
| TC_PMS_definePolicy_21 | Define Policy without policygroupname | 00:00:01 |
| TC_PMS_definePolicy_22 | Define policy without policy type | 00:00:01 |
| TC_PMS_definePolicy_14 | Define policy for Inactive policy group | 00:00:01 |
| TC_PMS_definePolicy_13 | Define policy for non existing policygroup | 00:00:01 |
| TC_PMS_definePolicy_09 | Define Policy for random AuthTypeToken | 00:00:01 |
| TC_PMS_definePolicy_11 | Define Policy without demo | 00:00:01 |
| TC_PMS_definePolicy_26 | Define policy | 00:00:01 |
| TC_PMS_definePolicy_24 | Define policy with invalid authtokentype | 00:00:01 |
| TC_PMS_definePolicy_25 | Define policy without authtoken type | 00:00:01 |
| TC_PMS_definePolicy_23 | Define policy without authtoken type | 00:00:01 |
| TC_PMS_definePolicy_07 | DefinePolicy without AuthTypeToken | 00:00:01 |
| DefineMISPPolicy — Passed | ||
| TC_PMS_DefineMISPPolicy_01 | Creating a Policy using PolicyGroup | 00:00:01 |
| DefineDataSharePolicy — Passed | ||
| TC_PMS_defineDataSharePolicy_01 | Create Data Share Policy with valid details | 00:00:01 |
| TC_PMS_defineDataSharePolicy_03 | Create Data Share Policy for update partner | 00:00:01 |
| TC_PMS_defineDataSharePolicy_02 | Create Data Share Policy for requested API Key | 00:00:01 |
| TC_PMS_defineDataSharePolicy_23 | Create Data Share Policy while keeping AttributeName parameter as custome name value | 00:00:01 |
| TC_PMS_defineDataSharePolicy_24 | Create Data Share Policy while Cancelling the created dataSharePolicy | 00:00:01 |
| TC_PMS_defineDataSharePolicy_22 | Create Data Share Policy while keeping EncryptionType parameter as none value | 00:00:01 |
| TC_PMS_defineDataSharePolicy_07 | Create Data Share Policy for inactive Policy Group | 00:00:01 |
| TC_PMS_defineDataSharePolicy_16 | Create Data Share Policy while keeping attributeName parameter as IndividualBiometrics | 00:00:01 |
| TC_PMS_defineDataSharePolicy_14 | Create Data Share Policy while keeping AttributeName parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_04 | Create Data Share Policy To check status | 00:00:01 |
| TC_PMS_defineDataSharePolicy_05 | Create Data Share Policy Without Mandatory Fields | 00:00:01 |
| TC_PMS_defineDataSharePolicy_17 | Create Data Share Policy while keeping attributeName parameter as Zipcode | 00:00:01 |
| TC_PMS_defineDataSharePolicy_06 | Create Data Share Policy with duplicate Policy name | 00:00:01 |
| TC_PMS_defineDataSharePolicy_15 | Create Data Share Policy while keeping Format parameter with spaces value | 00:00:01 |
| TC_PMS_defineDataSharePolicy_08 | Create Data Share Policy while keeping invalid Policy Group name | 00:00:01 |
| TC_PMS_defineDataSharePolicy_09 | Create Data Share Policy while keeping invalid Policy Type | 00:00:01 |
| TC_PMS_defineDataSharePolicy_12 | Create Data Share Policy while keeping Policy Group Name parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_13 | Create Data Share Policy while keeping Policy Type parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_11 | Create Data Share Policy while keeping description parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_10 | Create Data Share Policy while keeping name parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_21 | Create Data Share Policy while keeping shareDomain parameter as https | 00:00:01 |
| TC_PMS_defineDataSharePolicy_19 | Create Data Share Policy while keeping typeOfShare parameter as Direct value | 00:00:01 |
| TC_PMS_defineDataSharePolicy_20 | Create Data Share Policy while keeping typeOfShare parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_18 | Create Data Share Policy while keeping typeofShare parameter with spaces value | 00:00:01 |
| TC_PMS_defineDataSharePolicy_25 | Create Data Share Policy without PolicyId | 00:00:01 |
| UpdatePolicy — Passed | ||
| TC_PMS_createUpdatePolicy_06 | Update Policy while keeping InputParameter as invalid for PolicyID | 00:00:01 |
| TC_PMS_createUpdatePolicy_02 | Update Policy with invalid PolicyID | 00:00:01 |
| TC_PMS_createUpdatePolicy_03 | Update Policy with invalid PolicyGroupName | 00:00:01 |
| TC_PMS_createUpdatePolicy_07 | Update Policy while keeping authTokeType Parameter as Empty | 00:00:01 |
| TC_PMS_createUpdatePolicy_05 | Update Policy while keeping InputParameter as empty | 00:00:01 |
| TC_PMS_createUpdatePolicy_04 | Update Policy with invalid PolicyParameterName | 00:00:01 |
| TC_PMS_createUpdatePolicy_08 | Update Policy while keeping PolicyGroupName Parameter as Empty | 00:00:01 |
| UpdatePolicyStatus — Passed | ||
| TC_PMS_UpdatePolicyStatus_04 | Update Policy Status as Active with invalid data | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_01 | Update Policy Status as DeActive | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_03 | Update Policy Status as DeActive for datashare | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_08 | Update Policy Status while keeping status parameter as empty | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_07 | Update Policy Status while keeping PolicyGroupId parameter as invalid | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_05 | Update Policy Status as Active with invalid PolicyID | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_06 | Update Policy Status while keeping status parameter as invalid | 00:00:01 |
| PublishPolicy — Passed | ||
| Partner_PublishDataSharePolicy_All_Valid_Smoke | 00:00:01 | |
| Pms_PublishPolicy_All_Valid_ForInProgressPolicyMapping | Publish The Policy for rejecting partner policy mapping request | 00:00:01 |
| Pms_PublishPolicy_All_Valid_ForRejectPolicyMapping | Publish The Policy for rejecting partner policy mapping request | 00:00:01 |
| Pms_PublishPolicy_All_Valid_Smoke | Publish The Policy | 00:00:01 |
| Pms_PublishPolicy_All_Valid_Smoke_ForNeg | Publish The Policy | 00:00:01 |
| Pms_PublishPolicy_All_Valid_forDeactivatePolicyGroup_ForNeg | Publish The Policy for deactivate policy group with published policy | 00:00:01 |
| Pms_PublishPolicy_ForDeactive_All_Valid_Smoke | Publish The Policy | 00:00:01 |
| Pms_PublishPolicy_InValid_AlreadyPublished_neg | Publish The Policy which is already published | 00:00:01 |
| Pms_PublishPolicy_InValid_policyId_neg | Publish The Policy with invalid policyid | 00:00:01 |
| Pms_PublishPolicy_InValid_policygroupId_neg | Publish The Policy with invalid policygroupid | 00:00:01 |
| Pms_PublishPolicy_MISPPolicy_All_Valid_Smoke | Publish MISP Policy created by PartnerAdmin | 00:00:01 |
| Pms_PublishPolicy_invalid_auth_neg | Publish The Policy without access token | 00:00:01 |
| GetAllActivePolicyGroups — Passed | ||
| TC_PMS_GetAllActivePolicyGroups_01 | Fetching all the active PolicyGroups | 00:00:01 |
| TC_PMS_GetAllActivePolicyGroups_03 | Fetching all the active PolicyGroups with invalid token | 00:00:01 |
| TC_PMS_GetAllActivePolicyGroups_02 | Fetching all the active PolicyGroups without token | 00:00:01 |
| GetPolicy — Passed | ||
| TC_PMS_getPolicy_01 | Retrieve Parter Policy | 00:00:01 |
| TC_PMS_getPolicy_02 | Retrieve Parter Policy with invalid PolicyId | 00:00:01 |
| SearchPolicy — Passed | ||
| TC_PMS_createSearchPartner_01 | Create Search Policy with valid details | 00:00:01 |
| TC_PMS_createSearchPartner_03 | Create Search Policy with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchPartner_05 | Create Search Policy with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchPartner_04 | Create Search Policy with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchPartner_02 | Create Search Policy with valid details | 00:00:01 |
| TC_PMS_createSearchPartner_06 | Create Search Policy while keeping Type parameter as contains and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPartner_07 | Create Search Policy while keeping Type parameter as contains and filter the data in descending order | 00:00:01 |
| TC_PMS_createSearchPartner_09 | Create Search Policy while keeping Type parameter as Equals and filter the data in ascending order | 00:00:01 |
| TC_PMS_createSearchPartner_08 | Create Search Policy while keeping Type parameter as Equals and filter the data in descending order | 00:00:01 |
| TC_PMS_createSearchPartner_10 | Create Search Policy while keeping Type parameter as Startswith and filter the data in ascending order | 00:00:01 |
| TC_PMS_createSearchPartner_11 | Create Search Policy while keeping Type parameter as Startswith and filter the data in descending order | 00:00:01 |
| TC_PMS_createSearchPartner_15 | Create Search Policy while keeping columnName parameter | 00:00:01 |
| TC_PMS_createSearchPartner_20 | Create Search Policy while keeping sortField parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartner_18 | Create Search Policy while keeping sortType parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartner_12 | Create Search Policy while keeping value parameter as invalid and filter the data in descending order | 00:00:01 |
| TC_PMS_createSearchPartner_13 | Create Search Policy while keeping value parameter as invalid and Type parameter as Equals | 00:00:01 |
| TC_PMS_createSearchPartner_14 | Create Search Policy while keeping value parameter as invalid and Type parameter as startswith | 00:00:01 |
| TC_PMS_createSearchPartner_16 | Create Search Policy while keeping columnName parameter as Empty | 00:00:01 |
| TC_PMS_createSearchPartner_21 | Create Search Policy while keeping sortField parameter as Empty | 00:00:01 |
| TC_PMS_createSearchPartner_19 | Create Search Policy while keeping sortType parameter as Empty | 00:00:01 |
| TC_PMS_createSearchPartner_17 | Create Search Policy while keeping Type parameter as Empty | 00:00:01 |
| PrintPartner — Passed | ||
| TC_PMS_createPartnerSelfRegistration_01 | Create Print Partner Self Registration with valid details | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_02 | Create Print Partner Self Registration with duplicate Email | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_03 | Create Print Partner Self Registration while keeping SpaceIn PartnerId | 00:00:01 |
| UploadCACertificatePrintPartner — Passed | ||
| TC_PMS_uploadCert_01 | Upload valid CA Certificate for Print Partner | 00:00:01 |
| UploadPartnerCertificatePrintPartner — Passed | ||
| TC_PMS_UploadPartnerCert_01 | Upload Print Partner Certificate | 00:00:01 |
| UpdatePrintPartner — Passed | ||
| TC_PMS_UpdatePrintPartner_01 | Update Print Partner with valid details | 00:00:01 |
| GetPrintPartnerDetails — Passed | ||
| TC_PMS_GetPartnerDetails_01 | Retrieve Print Partner Details | 00:00:01 |
| GetAllApiKeyForAuthPartnerWithoutPartnerRegister — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerWithoutPartnerRegister_01 | Fetching all the API Key Without Partner Register | 00:00:01 |
| GetAllApprovedPartnerIdBeforePartnerCreate — Passed | ||
| Pms_GetAllApprovedAuthPartnerId_BeforePartnerCreate_Neg | Fetching all approved Partner Id | 00:00:01 |
| CreatePartner — Passed | ||
| TC_PMS_createPartnerSelfRegistration_10 | Create Partner Self Registrartion with Deactivated Partner ID | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_11 | Create Partner Self Registrartion with Already Existing Policy Name | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_14 | Create Partner Self Registrartion with Already Existing Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_09 | Create Partner Self Registrartion with Deactivated Partner ID | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_13 | Create Partner Self Registrartion with Policy Group | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_16 | Create Partner Self Registrartion while keeping the PartnerID parameter as missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_17 | Create Partner Self Registrartion while keeping the address parameter as missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_18 | Create Partner Self Registrartion while keeping the Contact Number parameter as missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_19 | Create Partner Self Registrartion while keeping the emailID parameter as missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_20 | Create Partner Self Registrartion while keeping the PartnerType parameter as missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_12 | Create Partner Self Registrartion with invalid PartnerID | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_15 | Create Partner Self Registrartion and update Policy Group for Partner with valid data | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_08 | Creating a Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_01 | Creating a Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_06 | Creating a Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_07 | Creating a Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_03 | Creating a Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_04 | Creating a Partner with missing request time | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_05 | Creating a Partner with invalid request time | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_02 | Creating a Partner | 00:00:01 |
| MISPPartnerV3 — Passed | ||
| TC_PMS_CreateMISPPartnerRegistration_01 | Create MISP Partner Self Registration | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_02 | Create MISP Partner Self Registration Empty Policy group | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_04 | Create MISP Partner Self Registration with maximum 2000 words in Address field | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_05 | Create MISP Partner Self Registration with maximum 16 numbers in contactNumber field | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_06 | Create MISP Partner Self Registration with maximum 254 email id | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_03 | Create MISP Partner Self Registration without Policy group | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_07 | Create MISP Partner Self Registration with lang code arabic | 00:00:01 |
| MISPPartnerV3NegativeScenarios — Passed | ||
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_16 | Create MISP Partner Self Registration with less than expected values in EmailID field | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_12 | Create MISP Partner Self Registration with more than maximum 2000 words in Address field | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_10 | Create MISP Partner Self Registration with Missing Address | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_13 | Create MISP Partner Self Registration with Empty ContactNumber | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_08 | Create MISP Partner Self Registration with Empty Email Address | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_06 | Create MISP Partner Self Registration with Empty OrganizationName | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_02 | Create MISP Partner Self Registration with Empty Partner ID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_17 | Create MISP Partner Self Registration with Empty PartnerType | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_25 | Create MISP Partner Self Registration with Empty requestID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_21 | Create MISP Partner Self Registration with Empty requestTime | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_19 | Create MISP Partner Self Registration with Empty lang code | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_09 | Create MISP Partner Self Registration with Invalid Email Address | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_18 | Create MISP Partner Self Registration with Invalid PartnerType | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_04 | Create MISP Partner Self Registration with Invalid Policy group | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_22 | Create MISP Partner Self Registration with Invalid requestID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_28 | Create MISP Partner Self Registration Invalid Version | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_20 | Create MISP Partner Self Registration with invalid lang code | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_07 | Create MISP Partner Self Registration with Missing OrganizationName | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_03 | Create MISP Partner Self Registration with Empty Partner ID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_11 | Create MISP Partner Self Registration with Null Address | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_05 | Create MISP Partner Self Registration with SpecialCharacters Policy group | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_30 | Create MISP Partner Self Registration version value 0 | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_29 | Create MISP Partner Self Registration version value 1 | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_32 | Create MISP Partner Self Registration with already registered Email address | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_33 | Create MISP Partner Self Registration with already registered Partner | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_14 | Create MISP Partner Self Registration with more than expected values in ContactNumber | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_15 | Create MISP Partner Self Registration with more than expected values in EmailID field | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_24 | Create MISP Partner Self Registration with null requestID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_27 | Create MISP Partner Self Registration null Version | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_01 | Create MISP Partner Self Registration without Access Token | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_23 | Create MISP Partner Self Registration with Invalid requestID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_31 | Create MISP Partner Self Registration without requestTime | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_26 | Create MISP Partner Self Registration without Version | 00:00:01 |
| UploadCertificateMISPCASUBCA — Passed | ||
| TC_PMS_UploadCertificateMISPCASUBCA_01 | Upload valid CA certificate for Misp Partner | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_03 | Upload valid CA certificate for Misp Partner | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_02 | Upload valid SUBCA certificate for Misp Partner | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_04 | Upload valid SUBCA certificate for Misp Partner | 00:00:01 |
| UploadMISPPartnerCertificate — Passed | ||
| TC_PMS_UploadMISPPartnerCertificate_01 | Upload MISP partner certificate for PMS-111555 partner id | 00:00:01 |
| TC_PMS_UploadMISPPartnerCertificate_04 | Upload MISP partner certificate for PMS-111558 partner id | 00:00:01 |
| TC_PMS_UploadMISPPartnerCertificate_05 | Upload MISP partner certificate for PMS-111559 partner id | 00:00:01 |
| TC_PMS_UploadMISPPartnerCertificate_06 | Upload MISP partner certificate for PMS-111550 partner id | 00:00:01 |
| TC_PMS_UploadMISPPartnerCertificate_07 | Upload MISP partner certificate for PMS-111551 partner id | 00:00:01 |
| TC_PMS_UploadMISPPartnerCertificate_02 | Upload MISP partner certificate for PMS-111556 partner id | 00:00:01 |
| TC_PMS_UploadMISPPartnerCertificate_03 | Upload MISP partner certificate for PMS-111557 partner id | 00:00:01 |
| LinkPolicyGroupToMISPPartner — Passed | ||
| TC_PMS_LinkPolicyGroupToMISPPartner_01 | Linking Policy Group to MISP Partner using valid Access Token | 00:00:01 |
| LinkPolicyGroupToMISPPartnerNegTC — Passed | ||
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_10 | Linking Policy Group to MISP Partner using already linked PartnerId | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_03 | Linking Policy Group to MISP Partner using invalid Request and valid PartnerId | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_04 | Linking Policy Group to MISP Partner using invalid Id | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_01 | Linking Policy Group to MISP Partner using Invalid Access Token | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_05 | Linking Policy Group to MISP Partner using Auth partner | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_06 | Linking Policy Group to MISP Partner using Device partner | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_07 | Linking Policy Group to MISP Partner using FTM partner | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_09 | Link Policy Group to MISP Partner using Invalid RequestTime | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_08 | Linking Policy Group to MISP Partner using Invalid Version | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_02 | Linking Policy Group to MISP Partner using Invalid PartnerId | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_12 | Linking Policy Group to MISP Partner using Empty request ID | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_18 | Linking Policy Group to MISP Partner using Empty RequestTime | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_13 | Linking Policy Group to MISP Partner using NULL requst ID | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_15 | Linking Policy Group to MISP Partner using NULL Version Parameter | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_17 | Linking Policy Group to MISP Partner using version value as 0 | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_16 | Linking Policy Group to MISP Partner using version value as 1 | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_21 | Linking Policy Group to MISP Partner using without Object Body | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_20 | Linking Policy Group to MISP Partner using without Partneradmin role | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_19 | Linking Policy Group to MISP Partner using without RequestTime | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_14 | Linking Policy Group to MISP Partner without Version field | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_11 | Linking Policy Group to MISP Partner without requestId | 00:00:01 |
| MISPPartnerExists — Passed | ||
| TC_PMS_MISPPartnerExists_01 | Checking MISP Partner Exists for given Partner ID and Email ID | 00:00:01 |
| MISPPartnerExistsNegTC — Passed | ||
| TC_PMS_MISPPartnerExistsNegTC_06 | Checking MISP Partner Exists with Email ID as string | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_04 | Checking MISP Partner Exists with Empty Partner Type | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_01 | Checking MISP Partner Exists with Invalid Access Token | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_02 | Checking MISP Partner Exists with Invalid Id | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_05 | Checking MISP Partner Exists with Invalid Partner Type | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_03 | Checking MISP Partner Exists with Invalid Version | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_07 | Checking MISP Partner Exists with PartnerId As string | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_08 | Checking MISP Partner Exists with Partner Type as string | 00:00:01 |
| GetListofPartnersAssociatedwithLoggedinUser — Passed | ||
| TC_GetListofPartnersAssociatedwithLoggedinUser_01 | Retrieve all MISP Partner records with status approved | 00:00:03 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_08 | Retrieve all th ePartner Id's associated with Auth Partner token | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_09 | Retrieve all th ePartner Id's associated with Device Partner token | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_10 | Retrieve all th ePartner Id's associated with FTM Partner token | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_07 | Retrieve all MISP Partner records with only query parameter kept as status | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_06 | Retrieve all MISP Partner records with partnerType Empty | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_05 | Retrieve all MISP Partner records with policyGroupAvailable Empty | 00:00:03 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_03 | Retrieve all MISP Partner records with status InProgress | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_04 | Retrieve all MISP Partner records with status true | 00:00:03 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_02 | Retrieve all MISP Partner records with status InProgress | 00:00:01 |
| GetListofPartnersAssociatedwithLoggedinUserNegSce — Passed | ||
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_08 | Retrieve all MISP Partner records with invalid status and valid partnertype | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_01 | Retrieve all MISP Partner records with invalid access token | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_03 | Retrieve all MISP Partner records with invalid partnerType | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_06 | Retrieve all MISP Partner records with invalid Special Characters in partnerType | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_07 | Retrieve all MISP Partner records with non-Admin user fetching MISP_Partner | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_02 | Retrieve all MISP Partner records with invalid Special Characters in status | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_04 | Retrieve all MISP Partner records with invalid Special Characters in partnerType | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_10 | Retrieve all MISP Partner records with invalid status and invalid partnertype | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_05 | Retrieve all MISP Partner records with invalid Special Characters in partnerType | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_09 | Retrieve all MISP Partner records with valid status and invalid partnertype | 00:00:01 |
| CreatePartner_Online_Verification_Partner — Passed | ||
| TC_PMS_createPartnerSelfRegistration_01 | Create Partner self Registrartion with Valid data | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_03 | Create Partner self Registrartion with existing Email | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_02 | Create Partner self Registrartion without PartnerID | 00:00:01 |
| GetAllApiKeyForAuthPartnerWithoutPartnerCertifcates — Passed | ||
| Pms_GetAllApiKeyForAuthPartner_withoutuploadCert_Neg | Fetching all the API Key Without Partner Register | 00:00:01 |
| VerifyPartnersEmail — Passed | ||
| TC_PMS_VerifyPartnersEmail_01 | Verify Partners Email | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_03 | Verify Partners Email | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_07 | Verify Partners Email | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_06 | Verify Partners Email | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_05 | Verify Partners Email | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_04 | Verify Partners Email | 00:00:01 |
| GetPartnerExpiringCertificateBeforeCertificateUpload — Passed | ||
| TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_03 | Get Partner Expiring Certificates Before Certificate Upload | 00:00:01 |
| UploadCACertificate — Passed | ||
| TC_PMS_UploadCACertificate_01 | Upload CA Cert | 00:00:01 |
| TC_PMS_UploadCACertificate_05 | Upload CA Cert which is already uploaded | 00:00:01 |
| TC_PMS_UploadCACertificate_07 | Upload CA Cert with blank data | 00:00:01 |
| TC_PMS_UploadCACertificate_06 | Upload CA Cert with invalid data | 00:00:01 |
| TC_PMS_UploadCACertificate_03 | Upload CA Cert | 00:00:01 |
| TC_PMS_UploadCACertificate_08 | Upload CA Cert | 00:00:01 |
| TC_PMS_UploadCACertificate_04 | Upload Sub-CA Cert | 00:00:01 |
| TC_PMS_UploadCACertificate_09 | Upload Sub-CA Cert | 00:00:01 |
| TC_PMS_UploadCACertificate_02 | Upload Sub-CA Cert | 00:00:02 |
| GetAllCertificateBeforeCACertificateUpload — Passed | ||
| TC_PMS_GetAllCertificateBeforeCACertificateUpload_01 | Fetching all the API certificates of the Logged in Partner | 00:00:01 |
| GetOriginalPartnerCertificatesBeforeCertificateUpload — Passed | ||
| TC_PMS_getPartner_certificate_08 | Get original Auth partner certificates before certificate upload | 00:00:01 |
| UploadPartnerCertificate — Passed | ||
| TC_PMS_uploadPartnerCert_01 | Upload Partner Cert | 00:00:04 |
| TC_PMS_uploadPartnerCert_07 | Upload partner certificate again | 00:00:03 |
| TC_PMS_uploadPartnerCert_06 | Upload Partner Cert by giving invalid domain | 00:00:01 |
| TC_PMS_uploadPartnerCert_05 | Upload Partner Cert by giving invalid cert data | 00:00:01 |
| TC_PMS_uploadPartnerCert_04 | Upload Partner Cert without partnerdomain | 00:00:01 |
| TC_PMS_uploadPartnerCert_03 | Upload Partner Cert | 00:00:02 |
| TC_PMS_uploadPartnerCert_08 | Upload Partner Cert | 00:00:01 |
| GetPartnerCertificate — Passed | ||
| Pms_GetPartnerCert_AuthPartner_All_Valid_Smoke | Fetching all the certificate for the Partner Id | 00:00:01 |
| Pms_GetPartnerCert_DeviceProvider_All_Valid_Smoke | Fetching all the certificate for the Partner Id | 00:00:01 |
| Pms_GetPartnerCert_FtmProvider_All_Valid_Smoke | Fetching all the certificate for the Partner Id | 00:00:01 |
| TC_PMS_GetPartnerCert_03 | Fetching all the certificate for the Partner Id | 00:00:01 |
| GetAllCertificate — Passed | ||
| TC_PMS_GetAllCertificate_02 | Fetching all the API certificates of the Loggedin Partner | 00:00:01 |
| TC_PMS_GetAllCertificate_01 | Fetching all the API certificates of the Logged in Partner | 00:00:01 |
| TC_PMS_GetAllCertificate_04 | Fetching all the API certificates of the partner invalid partner | 00:00:01 |
| TC_PMS_GetAllCertificate_03 | Fetching all the API certificates of the partner without login | 00:00:01 |
| UpdatePartner — Passed | ||
| TC_PMS_updatePartnerDetails_01 | Update Partner Details for Partner with valid data | 00:00:01 |
| TC_PMS_updatePartnerDetails_03 | Update Partner Details for Partner while keeping Address parameter as missing | 00:00:01 |
| TC_PMS_updatePartnerDetails_04 | Update Partner Details for Partner while keeping Contact Number parameter as missing | 00:00:01 |
| TC_PMS_updatePartnerDetails_02 | Update Partner Details for Partner with invalid partnerID | 00:00:01 |
| UploadCACertificate_Online_Verification_Partner — Passed | ||
| TC_PMS_uploadCert_01 | Upload CA Certificate for Partner | 00:00:01 |
| TC_PMS_uploadCert_02 | Upload CA Certificate for Partner with invalid certificate data | 00:00:01 |
| TC_PMS_uploadCert_03 | Upload SUBCA Certificate for Partner | 00:00:01 |
| UploadPartnerCertificate_Online_Verification_Partner — Passed | ||
| TC_PMS_uploadPartnerCert_01 | Upload valid Partner certificate for Partner | 00:00:03 |
| GetPartnerDetails_Online_Verification_Partner — Passed | ||
| TC_PMS_getPartnerCert_01 | Retreive Partner details | 00:00:01 |
| TC_PMS_getPartnerCert_02 | Retreive Partner details with invalid PartnerID | 00:00:01 |
| GetPartnerCertificate_Online_Verification_Partner — Passed | ||
| TC_PMS_getPartnerCert_01 | Retreive Partner certificate | 00:00:01 |
| GetAllApprovedPartnerId — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerId_01 | Fetching all approved Partner Id | 00:00:01 |
| GetAllApprovedPartnerIdWithoutAuthentication — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerId_02 | Fetching all approved Partner Id with invalid token | 00:00:01 |
| TC_PMS_GetAllApprovedAuthPartnerId_01 | Fetching all approved Partner Id without token | 00:00:01 |
| GetAllApiKeyForAuthPartnerBeforePolicyMapping — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerBeforePolicyMapping_01 | Fetching all the API Key Before Policy Mapping | 00:00:01 |
| GetAllRequestedPolicyBeforeMapping — Passed | ||
| TC_PMS_GetAllRequestedPolicies_01 | Fetching all the Requested Policies | 00:00:01 |
| AddAdditionalContact — Passed | ||
| TC_PMS_AddContact_01 | Create Contact details for Partner with Valid data | 00:00:01 |
| TC_PMS_AddContact_02 | Create contact details for the Partner while keeping the address parameter as missing | 00:00:01 |
| TC_PMS_AddContact_03 | Create contact details for the Partner while keeping the contactNumber parameter as missing | 00:00:01 |
| TC_PMS_AddContact_04 | Create contact details for the Partner while keeping the emailID parameter as missing | 00:00:01 |
| partnerPolicyMapping — Passed | ||
| TC_PMS_RequestAPIKeyCredentialPartner_06 | Create Partner API Key Request for Credential Partner with invalid Policy Name use case description | 00:00:01 |
| TC_PMS_RequestAPIKeyCredentialPartner_05 | Create Partner API Key Request for Credential Partner with invalid use case description | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_03 | Create Partner API Key Request for Partner with Deactivated Policy | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_04 | Create Partner API Key Request for Partner and mapping the Partner with Inprogress Policy | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_01 | Create Partner API Key Request for Partner with valid data | 00:00:01 |
| Pms_partnerPolicyMapping_All_Valid_Smoke_sid | Mapping Partner & Policy | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_02 | Mapping Partner & Policy | 00:00:01 |
| Pms_partnerPolicyMapping_ForPending_All_Valid_sid | Mapping Partner & Policy | 00:00:01 |
| Pms_partnerPolicyMapping_ForRejecting_All_Valid_sid | Mapping Partner & Policy | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_03 | Mapping Partner & Policy | 00:00:01 |
| Pms_partnerPolicyMapping_invalid_partnerId_neg | Mapping Partner & Policy when invalid partnerId is given | 00:00:01 |
| Pms_partnerPolicyMapping_invalid_policyName_neg | Mapping Partner & Policy when invalid policyname is given | 00:00:01 |
| Pms_partnerPolicyMapping_missing_policyName_neg | Mapping Partner & Policy when policyname is removed from request | 00:00:01 |
| Pms_partnerPolicyMapping_missing_useCaseDescription_neg | Mapping Partner & Policy when usecaseDescription is removed from request | 00:00:01 |
| AddBioExtractors — Passed | ||
| TC_PMS_addBioExtractors_01 | Add BioExtractors for MOSIPDataSharePolicy for valid PolicyID | 00:00:01 |
| TC_PMS_addBioExtractors_02 | Add BioExtractors for MOSIP Policy for valid PolicyID | 00:00:01 |
| TC_PMS_addBioExtractors_04 | Add BioExtractors for invalid PartnerID | 00:00:01 |
| TC_PMS_addBioExtractors_03 | Add BioExtractors for invalid PolicyID | 00:00:01 |
| RejectMappingKey — Passed | ||
| TC_PMS_RejectAPIKey_02 | Update the status for Approved Partner while keeping the Status parameter as missing | 00:00:01 |
| ApproveMappingKey — Passed | ||
| Pms_ApproveMappingKey_All_Valid_Smoke | Approve the Mapping Key | 00:00:01 |
| TC_PMS_ApproveAPIKey_01 | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_For_MISP_Policy_All_Valid_Smoke | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_Map_partner_toalready_mapped_policy_neg | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_Missing_Request_Time_Neg | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_Missing_status_Neg | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_PastDate_Request_Time_Neg | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_Reject_All_Valid | Reject the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_Rejected_All_Valid_Smoke | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_SpaceIn_mapping_key_Neg | Approve the Mapping Key | 00:00:01 |
| GetAllRequestedPolicy — Passed | ||
| TC_PMS_GetAllRequestedPolicies_01 | Fetching all the Requested Policies | 00:00:01 |
| GetAllRequestedPolicyAuthvalidations — Passed | ||
| TC_PMS_GetAllRequestedPolicies_02 | Fetching all the Requested Policies with invalid role | 00:00:01 |
| TC_PMS_GetAllRequestedPolicies_01 | Fetching all the Requested Policies without login token | 00:00:01 |
| GetAllApprovedAuthPartnerPolicy — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerPolicy_01 | Fetching all Approved Auth Partner Policies | 00:00:01 |
| GetAllApprovedAuthPartnerPolicyAuthValidations — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerPolicy_02 | Fetching all Approved Auth Partner Policies with invalid token | 00:00:01 |
| TC_PMS_GetAllApprovedAuthPartnerPolicy_01 | Fetching all Approved Auth Partner Policies without token | 00:00:01 |
| GetAllApiKeyForAuthPartnerBeforeApikeyGenerated — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerBeforeApiKeyGenerated_01 | Fetching all the API Key Without Partner Register | 00:00:01 |
| GenerateApiKey — Passed | ||
| TC_PMS_GenerateApikey_01 | Generating an API Key | 00:00:01 |
| TC_PMS_GenerateApikey_07 | Generate Api Keys for Approved Policies with invalid policy | 00:00:01 |
| TC_PMS_GenerateApikey_03 | Generating an API Key | 00:00:01 |
| TC_PMS_GenerateApikey_05 | Generating an API Key | 00:00:01 |
| TC_PMS_GenerateApikey_06 | Generating an API Key | 00:00:01 |
| TC_PMS_GenerateApikey_04 | Generating an API Key | 00:00:01 |
| TC_PMS_GenerateApikey_02 | Generating an API Key | 00:00:01 |
| Pms_GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid | 00:00:01 | |
| ActivateDeactivatePartnerApiKey — Passed | ||
| TC_PMS_ActivateDeactivatePartnerApiKey_08 | Update the status for Activated PartnerAPIKey as Activate by Removing label | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_07 | Update the status for Activated PartnerAPIKey as Activate by Providing Duplicate label | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_06 | Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid Label | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_03 | Update the status for Activated PartnerAPIKey as Activate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_02 | Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid APIKey | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_01 | Update the status for Deactivated PartnerAPIKey as Deactivate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_04 | Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid PartnerId | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_05 | Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid PolicyId | 00:00:01 |
| InsertDBData — Passed | ||
| TC_DBDependent_InsertQuery_03 | Inserting data in partner policy table for creation of API Key ID | 00:00:01 |
| TC_DBDependent_InsertQuery_02 | Inserting data in partner policy table for creation of API Key ID | 00:00:01 |
| TC_DBDependent_InsertQuery_01 | Inserting data in partner policy table for creation of API Key ID | 00:00:01 |
| GetAllApiKeyForAuthPartner — Passed | ||
| TC_PMS_GetAllApikeyForAuthPartner_01 | Fetching all the API Key available for Auth Partner | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_03 | Fetching all the API Key available for Auth Partner with invalid token | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_02 | Fetching all the API Key available for Auth Partner without token | 00:00:01 |
| GetAllApiKeyForAuthPartnerAfterDeactive — Passed | ||
| TC_PMS_GetAllApikeyForAuthPartner_01 | Fetching all the API Key available for Auth Partner | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_03 | Fetching all the API Key available for Auth Partner with invalid token | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_02 | Fetching all the API Key available for Auth Partner without token | 00:00:01 |
| GetAllPartnerPolicyRequest — Passed | ||
| TC_PMS_partner-policy-requests_01 | Fetching all the partner policy requests | 00:00:01 |
| TC_PMS_partner-policy-requests_07 | Fetching all the partner policy requests for policyId which contains '2' | 00:00:01 |
| TC_PMS_partner-policy-requests_22 | Fetching all the partner policy requests by giving value for partnerId and requestDetails | 00:00:01 |
| TC_PMS_partner-policy-requests_05 | Fetching all the partner policy requests for orgName which contains '1' | 00:00:01 |
| TC_PMS_partner-policy-requests_19 | Fetching all the partner policy requests by giving valid page number given | 00:00:01 |
| TC_PMS_partner-policy-requests_04 | Fetching all the partner policy requests for PartnerId which contains 'a' | 00:00:01 |
| TC_PMS_partner-policy-requests_10 | Fetching all the partner policy requests for partnerType which contains 'a' | 00:00:01 |
| TC_PMS_partner-policy-requests_09 | Fetching all the partner policy requests for policyGroupName which contains 'Group' | 00:00:01 |
| TC_PMS_partner-policy-requests_08 | Fetching all the partner policy requests for policyName which contains 'policy' | 00:00:01 |
| TC_PMS_partner-policy-requests_21 | Fetching all the partner policy requests by giving random value for partnerid | 00:00:01 |
| TC_PMS_partner-policy-requests_06 | Fetching all the partner policy requests for requestDetails which contains 'ab' | 00:00:01 |
| TC_PMS_partner-policy-requests_12 | Fetching all the partner policy requests by sort type ASC for the given sort field | 00:00:01 |
| TC_PMS_partner-policy-requests_11 | Fetching all the partner policy requests by sort type DESC for the given sort field | 00:00:01 |
| TC_PMS_partner-policy-requests_14 | Fetching all the partner policy requests for which status as Inprogress | 00:00:01 |
| TC_PMS_partner-policy-requests_15 | Fetching all the partner policy requests for which status as approved | 00:00:01 |
| TC_PMS_partner-policy-requests_16 | Fetching all the partner policy requests for which status as rejected | 00:00:01 |
| GetAllPartnerPolicyRequestNegativeScenarios — Passed | ||
| TC_PMS_partner-policy-requests_03 | Fetching all the partner policy requests with invalid token | 00:00:01 |
| TC_PMS_partner-policy-requests_18 | Fetching all the partner policy requests by giving negative pageNo value | 00:00:01 |
| TC_PMS_partner-policy-requests_17 | Fetching all the partner policy requests by giving negative pagesize value | 00:00:01 |
| TC_PMS_partner-policy-requests_20 | Fetching all the partner policy requests with invalid sortfieldname | 00:00:01 |
| TC_PMS_partner-policy-requests_13 | Fetching all the partner policy requests by invalid sort type | 00:00:01 |
| TC_PMS_partner-policy-requests_02 | Fetching all the partner policy requests without authentication | 00:00:01 |
| GetListOfPartners — Passed | ||
| TC_PMS_GetListOfPartners_01 | Fetching all the active List Of Partnered in the system | 00:00:01 |
| TC_PMS_GetListOfPartners_02 | Fetching all the active List Of Partnered in the system | 00:00:01 |
| TC_PMS_GetListOfPartners_24 | Retrieving all partners filtered by organization name and sorted in ascending order | 00:00:01 |
| TC_PMS_GetListOfPartners_23 | Retrieving all the Active partners | 00:00:01 |
| TC_PMS_GetListOfPartners_05 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_30 | Retrieving all partners filtered by certificateUploadStatus | 00:00:01 |
| TC_PMS_GetListOfPartners_31 | Retrieving all partners filtered by certificateUploadStatus in ascending order | 00:00:01 |
| TC_PMS_GetListOfPartners_33 | Retrieving all partners filtered by certificateUploadStatus in ascending order and without sortFieldName | 00:00:01 |
| TC_PMS_GetListOfPartners_32 | Retrieving all partners filtered by certificateUploadStatus in descending order | 00:00:01 |
| TC_PMS_GetListOfPartners_28 | Retrieving all partners filtered by partnerid and sorted in ascending order | 00:00:01 |
| TC_PMS_GetListOfPartners_09 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_12 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_14 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_08 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_10 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_11 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_13 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_29 | Retrieving all partners filtered by sortFieldName with invalid data | 00:00:01 |
| TC_PMS_GetListOfPartners_34 | Retrieving all partners filtered with invalid sortType | 00:00:01 |
| TC_PMS_GetListOfPartners_06 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_07 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_25 | Retrieving all partners filtered by partnerType and sorted in ascending order | 00:00:01 |
| TC_PMS_GetListOfPartners_26 | Retrieving all partners filtered by partnerType and sorted in descending order | 00:00:01 |
| TC_PMS_GetListOfPartners_28 | Retrieving all partners filtered by partnerid and sorted in ascending order | 00:00:01 |
| TC_PMS_GetListOfPartners_27 | Retrieving all partners filtered by partnerid and sorted in descending order | 00:00:01 |
| TC_PMS_GetListOfPartners_15 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_18 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_17 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_22 | Fetching all the active List Of Partner with empty policyGroup Name | 00:00:01 |
| TC_PMS_GetListOfPartners_04 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_19 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_16 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_21 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_03 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_20 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| GetDetailsOfPartner — Passed | ||
| Pms_GetDetailsOfPartner_All_Valid_Smoke | Fetching all the details of the Partner Id | 00:00:01 |
| TC_PMS_GetPartnerDetails_01 | Retrieve Device Partner Deatils | 00:00:01 |
| Pms_GetDetailsOfPartner_invalid_token_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| Pms_GetDetailsOfPartner_with_admin_role_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| Pms_GetDetailsOfPartner_with_invalid_partner_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| Pms_GetDetailsOfPartner_with_unauthor_token_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| Pms_GetDetailsOfPartner_with_unauthorized_token_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| Pms_GetDetailsOfPartner_without_admin_role_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| GetListOfPolicies — Passed | ||
| TC_PMS_listofPolicies_01 | Fetching all the active List Of Policies in the system | 00:00:01 |
| TC_PMS_listofPolicies_02 | Fetching all the active List Of Policies invalid token | 00:00:01 |
| TC_PMS_listofPolicies_21 | Fetching all the active List Of Policies with policyName and policyid given | 00:00:01 |
| TC_PMS_listofPolicies_08 | Fetching all the active List Of Policies with pageNo as '-6' | 00:00:01 |
| TC_PMS_listofPolicies_09 | Fetching all the active List Of Policies with pageSize as '-6' | 00:00:01 |
| TC_PMS_listofPolicies_10 | Fetching all the active List Of Policies with pageNo as '6' | 00:00:01 |
| TC_PMS_listofPolicies_07 | Fetching all the active List Of Policies with pageSize as '6' | 00:00:01 |
| TC_PMS_listofPolicies_20 | Fetching all the active List Of Policies with policyDescription as '3fdfds' | 00:00:01 |
| TC_PMS_listofPolicies_17 | Fetching all the active List Of Policies with policyDescription as 'a' | 00:00:01 |
| TC_PMS_listofPolicies_16 | Fetching all the active List Of Policies with policyGroupName as 'ab' | 00:00:01 |
| TC_PMS_listofPolicies_14 | Fetching all the active List Of Policies with policyId as '1' | 00:00:01 |
| TC_PMS_listofPolicies_15 | Fetching all the active List Of Policies with policyName as 'a' | 00:00:01 |
| TC_PMS_listofPolicies_19 | Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype | 00:00:01 |
| TC_PMS_listofPolicies_18 | Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype | 00:00:01 |
| TC_PMS_listofPolicies_11 | Fetching all the active List Of Policies with sortType as 'asc' | 00:00:01 |
| TC_PMS_listofPolicies_12 | Fetching all the active List Of Policies with sortType as 'desc' | 00:00:01 |
| TC_PMS_listofPolicies_13 | Fetching all the active List Of Policies with sortType as 'abdcfegff' | 00:00:01 |
| TC_PMS_listofPolicies_04 | Fetching all the active List Of Policies with status as 'activated' | 00:00:01 |
| TC_PMS_listofPolicies_05 | Fetching all the active List Of Policies with status as 'deactivated' | 00:00:01 |
| TC_PMS_listofPolicies_06 | Fetching all the active List Of Policies with status as 'draft' | 00:00:01 |
| TC_PMS_listofPolicies_03 | Fetching all the active List Of Policies without authentication | 00:00:01 |
| GetListOfPoliciesRequest — Passed | ||
| Pms_GetListOfPolicies_All_Valid_Smoke | Fetching all the active List Of Policies Request in the system | 00:00:01 |
| GetAllOidcClientBeforeOIDCCreation — Passed | ||
| TC_PMS_GetAllOidcClient_01 | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| OAuthClient — Passed | ||
| Pms_CreateOIDCClient_ForNeg_all_Valid_sid | Creating OAUTH Client | 00:00:01 |
| Pms_CreateOIDCClient_all_Valid_Smoke_sid | Creating OAUTH Client | 00:00:05 |
| Pms_CreateOIDCClient_invalid_RedirectUri_neg | Creating OAUTH Client with invalid redirectUri | 00:00:01 |
| Pms_CreateOIDCClient_invalid_auth_neg | Creating OAUTH Client without token | 00:00:01 |
| Pms_CreateOIDCClient_invalid_granttypes_neg | Creating OAUTH Client with invalid granttypes | 00:00:01 |
| Pms_CreateOIDCClient_invalid_logoUri_neg | Creating OAUTH Client with invalid logoUri | 00:00:01 |
| Pms_CreateOIDCClient_invalid_policyID_neg | Creating OAUTH Client with invalid policyid | 00:00:01 |
| Pms_CreateOIDCClient_invalid_publickey_neg | Creating OAUTH Client with invalid publickkey | 00:00:01 |
| Pms_CreateOIDCClient_without_granttypes_neg | Creating OAUTH Client without granttypes | 00:00:01 |
| Pms_CreateOIDCClient_without_name_neg | Creating OAUTH Client without name field | 00:00:01 |
| Pms_CreateOIDCClient_without_publickey_neg | Creating OAUTH Client without publickkey | 00:00:01 |
| GetAllOauthClient — Passed | ||
| Pms_GetAllOauthClient_All_Valid_Smoke | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| UpdateOAuthClient — Passed | ||
| Pms_UpdateOIDCClient_all_Valid_Smoke_sid | 00:00:01 | |
| GetAllOidcClient — Passed | ||
| TC_PMS_GetAllOidcClient_01 | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| GetAllOidcClientWithoutAuthentication — Passed | ||
| TC_PMS_GetAllOidcClient_02 | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| TC_PMS_GetAllOidcClient_01 | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| DeactivateOIDCClient — Passed | ||
| TC_PMS_DeactivateOIDCClient_03 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_11 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_10 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_05 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_04 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_09 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_07 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_08 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_06 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_02 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_01 | Deactivating The Oidc Client | 00:00:01 |
| GetAllOidcClientAfterDeactivateOfOIDC — Passed | ||
| TC_PMS_GetAllOidcClient_01 | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| GetConfiguration — Passed | ||
| Partner_GetConfiguration_allValid_smoke | 00:00:01 | |
| GetUserConsentBeforeConsentGiven — Passed | ||
| TC_pms_GetUserConsent_05 | Retrieve the PMS GetUserConsent before consent is saved | 00:00:01 |
| saveUserConsent — Passed | ||
| TC_PMS_saveUserConsent_01 | save User Consent | 00:00:01 |
| TC_PMS_saveUserConsent_02 | save User Consent when authentication is done with invalid roles | 00:00:01 |
| TC_PMS_saveUserConsent_04 | save User Consent for invalid user | 00:00:01 |
| TC_PMS_saveUserConsent_03 | save User Consent without authentication | 00:00:01 |
| GetUserConsent — Passed | ||
| TC_pms_GetUserConsent_04 | Retrieve PMS GetUserConsent Status with an Invalid Auth Token | 00:00:01 |
| TC_pms_GetUserConsent_03 | Retrieve the PMS GetUserConsent Status for invalid User and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetUserConsent_02 | Retrieve the PMS GetUserConsent Status Without an Access Token and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetUserConsent_01 | Retrieve the PMS GetUserConsent for All Valid Smoke | 00:00:01 |
| GetOriginalPartnerCertificates — Passed | ||
| TC_PMS_getPartner_certificate_03 | Get original ftm partner certificates | 00:00:01 |
| TC_PMS_getPartner_certificate_01 | Get original Auth partner certificates | 00:00:01 |
| TC_PMS_getPartner_certificate_04 | Get original Auth partner certificates when authenticated as device partner | 00:00:01 |
| TC_PMS_getPartner_certificate_06 | Get original Auth partner certificates random value for partnerid | 00:00:01 |
| TC_PMS_getPartner_certificate_07 | Get original Auth partner certificates without authentication | 00:00:01 |
| TC_PMS_getPartner_certificate_05 | Get original Auth partner certificates without partnerid | 00:00:01 |
| CreatePartner_MISP_Provider — Passed | ||
| TC_PMS_createPartnerSelfRegistration_01 | Create MISP Partner Self Registration | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_02 | Create MISP Partner Self Registration for Misp License | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_03 | Create MISP Partner Self Registration for Misp License | 00:00:01 |
| UploadCACertificate_MISP_Provider — Passed | ||
| TC_PMS_uploadCert_01 | Upload valid CA certificate for Misp Partner | 00:00:01 |
| TC_PMS_uploadCert_02 | Upload valid SUBCA certificate for Misp Partner | 00:00:01 |
| UploadPartnerCertificate_MISP_Provider — Passed | ||
| TC_PMS_UploadPartnerCert_01 | Upload valid certificate for Misp Partner | 00:00:03 |
| TC_PMS_UploadPartnerCert_02 | Upload valid certificate for Misp License | 00:00:03 |
| TC_PMS_UploadPartnerCert_03 | Upload valid certificate for Misp License with valid PartnerID | 00:00:03 |
| GetPartnerDetails_MISP_Provider — Passed | ||
| TC_PMS_getPartnerCert_01 | Retrieve Misp Partner details | 00:00:01 |
| TC_PMS_getPartnerCert_02 | Retrieve Misp Partner details with valid PartnerId | 00:00:01 |
| GetPartnerCertificate_MISP_Provider — Passed | ||
| TC_PMS_getPartnerCert_01 | Retrieve Misp Partner Certificate | 00:00:01 |
| CreateDeviceDetail — Passed | ||
| TC_PMS_createServiceToSaveDeviceDetail_01 | Create Service To Save Device Details with valid details | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_05 | Create Service To Save Device Details while keeping already exisits Model | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_06 | Create Service To Save Device Details while keeping DeviceId as empty | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_07 | Create Service To Save Device Details while keeping DeviceProviderId as empty | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_08 | Create Service To Save Device Details while keeping DeviceSubTypeCode as empty | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_09 | Create Service To Save Device Details while keeping DeviceTypeCode as empty | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_02 | Create Service To Save Device Details while keeping same Make Model Type with valid details | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_03 | Create Service To Save Device Details while keeping same Make Model with valid details | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_04 | Create Service To Save Device Details while keeping same Type SubType with valid details | 00:00:01 |
| RejectDeviceDetail — Passed | ||
| TC_PMS_rejectDeviceDetail_01 | Reject Device Details with valid details | 00:00:01 |
| TC_PMS_rejectDeviceDetail_03 | Reject Device Details while keeping approvalStatus as empty | 00:00:01 |
| TC_PMS_rejectDeviceDetail_04 | Reject Device Details while keeping deviceId as empty | 00:00:01 |
| TC_PMS_rejectDeviceDetail_02 | Reject Device Details with valid details | 00:00:01 |
| ApproveDeviceDetail — Passed | ||
| TC_PMS_createApproveRejectDeviceDetail_01 | Create Device details for Approved Partner as Activate | 00:00:01 |
| TC_PMS_createApproveRejectDeviceDetail_02 | Create Device details for Approved Partner while keeping approvalStatus as empty | 00:00:01 |
| TC_PMS_createApproveRejectDeviceDetail_03 | Create Device details for Approved Partner as Activate while keeping deviceId as empty | 00:00:01 |
| UpdateDeviceDetail — Passed | ||
| TC_PMS_createServiceToUpdateDeviceDetail_01 | Create Service To Update DeviceDetail with valid details | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_03 | Create Service To Update DeviceDetail while keeping DeviceId as empty | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_04 | Create Service To Update DeviceDetail while keeping DeviceProvideId as empty | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_05 | Create Service To Update DeviceDetail while keeping DeviceSubTypeCode as empty | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_06 | Create Service To Update DeviceDetail while keeping DeviceTypeCode as empty | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_02 | Create Service To Update DeviceDetail afterReject | 00:00:01 |
| DeviceDetailsFilter — Passed | ||
| TC_PMS_DeviceDetailsFilter_06 | Create Device Details Filter while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_05 | Create Device Details Filter while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_04 | Create Device Details Filter while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_07 | Create Device Details Filter while keeping invalid values in Type parameter | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_02 | Create Device Details Filter to MapSBI | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_01 | Create Device Details Filter with valid values | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_03 | Create Device Details Filter with valid values | 00:00:01 |
| createSearchDeviceType — Passed | ||
| TC_PMS_createSearchDeviceType_01 | Create Search Device Type with all valid details | 00:00:01 |
| TC_PMS_createSearchDeviceType_02 | Create Search Device Type with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceType_04 | Create Search Device Type with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceType_05 | Create Search Device Type | 00:00:01 |
| TC_PMS_createSearchDeviceType_03 | Create Search Device Type with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceType_10 | Create Search Device Type while keeping sortField parameter as invalid | 00:00:01 |
| TC_PMS_createSearchDeviceType_08 | Create Search Device Type while keeping sortType parameter as invalid | 00:00:01 |
| TC_PMS_createSearchDeviceType_06 | Create Search Device Type while keeping columnName parameter as empty | 00:00:01 |
| TC_PMS_createSearchDeviceType_11 | Create Search Device Type while keeping sortField parameter as empty | 00:00:01 |
| TC_PMS_createSearchDeviceType_09 | Create Search Device Type while keeping sortType parameter as empty | 00:00:01 |
| TC_PMS_createSearchDeviceType_07 | Create Search Device Type while keeping Type parameter as empty | 00:00:01 |
| createSearchDeviceDetails — Passed | ||
| TC_PMS_createSearchDeviceDetails_02 | Create Search Device Details with all valid data | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_03 | Create Search Device Details with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_05 | Create Search Device Details with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_04 | Create Search Device Details with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_01 | Create Search Device Details while Type parameter as Equals and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_06 | Create Search Device Details with invalid columnName | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_10 | Create Search Device Details while keeping sortField parameter as invalid | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_08 | Create Search Device Details while keeping sortType parameter as invalid | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_11 | Create Search Device Details while keeping sortField parameter as empty | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_09 | Create Search Device Details while keeping sortType parameter as empty | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_07 | Create Search Device Details while keeping Type parameter as empty | 00:00:01 |
| GetListOfAllSBIBeforeAddingSBI — Passed | ||
| TC_PMS_SBI_List_21 | Fetching all the active SBI | 00:00:01 |
| SaveSecureBiometricInterfaceCreateDto — Passed | ||
| Pms_SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid | 00:00:01 | |
| Pms_SaveSecureBiometricInterface_All_Valid_Smoke_sid | 00:00:01 | |
| TC_PMS_createSaveSecureBiometricInterface_06 | Create SaveSecureBiometricInterface while keeping parameter PartnerId as empty | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_05 | Create SaveSecureBiometricInterface while keeping parameter swVersion as empty | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_07 | Create SaveSecureBiometricInterface while keeping parameter SpaceVal as empty | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_03 | Create SaveSecureBiometricInterface To Map sId | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_08 | Create SaveSecureBiometricInterface with valid details | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_08 | Create SaveSecureBiometricInterface with valid details | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_02 | Create SaveSecureBiometricInterface with valid details | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_04 | Create SaveSecureBiometricInterface with duplicate swVersion | 00:00:01 |
| RejectSecureBiometricInterface — Passed | ||
| TC_PMS_RejectSecureBiometricInterface_01 | Reject SecureBiometricInterface with valid detais | 00:00:01 |
| TC_PMS_RejectSecureBiometricInterface_04 | Reject SecureBiometricInterface while keeping parameter approvalStatus as Empty | 00:00:01 |
| TC_PMS_RejectSecureBiometricInterface_03 | Reject SecureBiometricInterface with SpaVal invalid | 00:00:01 |
| ApproveSecureBiometricInterface — Passed | ||
| TC_PMS_ApproveSecureBiometricInterface_01 | Approvr Secure Biometric Interface with valid details | 00:00:01 |
| TC_PMS_ApproveSecureBiometricInterface_02 | Approvr Secure Biometric Interface while keeping parameter approval status as empty | 00:00:01 |
| TC_PMS_ApproveSecureBiometricInterface_01 | Approvr Secure Biometric Interface with valid details | 00:00:01 |
| TC_PMS_ApproveSecureBiometricInterface_01 | Approvr Secure Biometric Interface with valid details | 00:00:01 |
| UpdateSecureBiometricInterface — Passed | ||
| TC_PMS_createUpdateSecureBiometricInterface_02 | Create UpdateSecureBiometricInterface AfterRejectwith valid details | 00:00:01 |
| Pms_UpdateSecureBiometricInterface_DeviceProvider_AllValid_Smoke | 00:00:01 | |
| TC_PMS_createUpdateSecureBiometricInterface_03 | Create UpdateSecureBiometricInterface while keeping parameter ID as empty | 00:00:01 |
| TC_PMS_createUpdateSecureBiometricInterface_02 | Create UpdateSecureBiometricInterface AfterRejectwith valid details | 00:00:01 |
| createSearchSecureBiometric — Passed | ||
| TC_PMS_createSearchSecureBiometric_01 | Create Search Secure Biometric with valid details | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_02 | Create Search Secure Biometric with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_04 | Create Search Secure Biometric with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_03 | Create Search Secure Biometric with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_05 | Create Search Secure Biometric while keeping Type parameter as contains and filter data in ascending order | 00:00:01 |
| GetAllApprovedDeviceProviderIds — Passed | ||
| TC_PMS_GetAllApprovedDeviceProviders_01 | Get All Approved Device ProviderId | 00:00:01 |
| GetAllApprovedDeviceProviderIdsNegativeScenarios — Passed | ||
| TC_PMS_GetAllApprovedDeviceProviderIds_02 | Retrieve All Approved Device ProviderIds with invalid access token | 00:00:01 |
| TC_PMS_GetAllApprovedDeviceProviderIds_01 | Retrieve All Approved Device ProviderIds Without Authentication | 00:00:01 |
| TC_PMS_GetAllApprovedDeviceProviderIds_04 | Retrieve All Device ProviderIds with Admin roles | 00:00:01 |
| TC_PMS_GetAllApprovedDeviceProviderIds_03 | Retrieve All Approved Device ProviderIds without_partner_roles | 00:00:01 |
| UpdateSBIID — Passed | ||
| TC_UpdateSBID_InsertQuery_03 | Updating SBI ID in SBI table for 10 days Expiry | 00:00:01 |
| TC_UpdateSBID_InsertQuery_02 | Updating SBI ID in SBI table for 15 days Expiry | 00:00:01 |
| TC_UpdateSBID_InsertQuery_01 | Updating SBI ID in SBI table for 30 days Expiry | 00:00:01 |
| GetSbiDetailsList — Passed | ||
| TC_pms_GetSbiDetailsList_01 | Retrieve the PMS GetSbiDetails List for All Valid Inputs | 00:00:01 |
| TC_pms_GetSbiDetailsList_03 | Retrieve Partner SBI Details with Admin Role and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetSbiDetailsList_05 | Retrieve Response With Authentication Partner Role and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetSbiDetailsList_06 | Retrieve Response With Authentication Partner Role and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetSbiDetailsList_04 | Retrieve Response Without Partner Role and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetSbiDetailsList_02 | Retrieve responce without authorization taken and Expecting an Error in The Response | 00:00:01 |
| DeviceTypeFilter — Passed | ||
| TC_PMS_DeviceTypeFilter_02 | Create Device Type Filter for Partner with valid values | 00:00:01 |
| TC_PMS_DeviceTypeFilter_05 | Create Device Type Filter for Partner while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_DeviceTypeFilter_04 | Create Device Type Filter for Partner while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_DeviceTypeFilter_03 | Create Device Type Filter for Partner while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_DeviceTypeFilter_06 | Create Device Type Filter for Partner while keeping invalid values in Type parameter | 00:00:01 |
| DeviceSubTypeFilter — Passed | ||
| TC_PMS_DeviceSubTypeFilter_01 | Device SubType Filter | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_02 | Create DeviceSubType Filter with valid values | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_06 | Create DeviceSubType Filter while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_04 | Create DeviceSubType Filter while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_03 | Create DeviceSubType Filter while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_05 | Create DeviceSubType Filter while keeping invalid values in Type parameter | 00:00:01 |
| SaveDeviceDetails — Passed | ||
| TC_PMS_SaveDeviceDetails_04 | Save Device Details | 00:00:01 |
| TC_PMS_SaveDeviceDetails_03 | Save Device Details | 00:00:01 |
| TC_PMS_SaveDeviceDetails_02 | Save Device Details | 00:00:01 |
| TC_PMS_SaveDeviceDetails_01 | Save Device Details | 00:00:01 |
| GetListOfAllSBI — Passed | ||
| TC_PMS_SBI_List_03 | Fetching all the active SBI | 00:00:01 |
| TC_PMS_SBI_List_24 | Fetching all the SBI details filter by Expiry period 10 days | 00:00:01 |
| TC_PMS_SBI_List_23 | Fetching all the SBI details filter by Expiry period 15 days | 00:00:01 |
| TC_PMS_SBI_List_22 | Fetching all the SBI details filter by Expiry period 30 days | 00:00:01 |
| TC_PMS_SBI_List_21 | Fetching all the SBI details with Parter device token | 00:00:01 |
| TC_PMS_SBI_List_14 | Fetching all the active SBI with orgName contains '1' | 00:00:01 |
| TC_PMS_SBI_List_20 | Fetching all the active SBI with pageSize specified | 00:00:01 |
| TC_PMS_SBI_List_15 | Fetching all the active SBI with partnerId contains 'a' | 00:00:01 |
| TC_PMS_SBI_List_18 | Fetching all the active SBI with random value for partnerId | 00:00:01 |
| TC_PMS_SBI_List_12 | Fetching all the active SBI with sbiExpiryStatus as expired | 00:00:01 |
| TC_PMS_SBI_List_13 | Fetching all the active SBI with sbiExpiryStatus as vaild | 00:00:01 |
| TC_PMS_SBI_List_12 | Fetching all the active SBI with sbiVersion | 00:00:01 |
| TC_PMS_SBI_List_15 | Fetching all the active SBI with ASC | 00:00:01 |
| TC_PMS_SBI_List_17 | Fetching all the active SBI with sbiVersion | 00:00:01 |
| TC_PMS_SBI_List_09 | Fetching all the active SBI with status as approved | 00:00:01 |
| TC_PMS_SBI_List_10 | Fetching all the active SBI with status as deactivated | 00:00:01 |
| TC_PMS_SBI_List_11 | Fetching all the active SBI with status as pending_approval | 00:00:01 |
| TC_PMS_SBI_List_08 | Fetching all the active SBI with status as rejected | 00:00:01 |
| ServiceToFilterSBI — Passed | ||
| TC_PMS_ServiceToFilterSBI_02 | Create ServiceToFilterSBI for Partner while keeping Type parameter as All | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_06 | Create ServiceToFilterSBI for Partner while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_04 | Create ServiceToFilterSBI for Partner while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_03 | Create ServiceToFilterSBI for Partner while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_05 | Create ServiceToFilterSBI for Partner while keeping invalid values in Type parameter | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_01 | Create ServiceToFilterSBI for Partner while keeping Type parameter as Unique | 00:00:01 |
| MapDeviceWithSBI — Passed | ||
| TC_PMS_MapDeviceWithSBI_01 | MapDeviceWithSBI with valid details | 00:00:01 |
| TC_PMS_MapDeviceWithSBI_02 | MapDevice Partner With Multiple SBI valid details | 00:00:01 |
| TC_PMS_MapDeviceWithSBI_04 | MapDevice Partner With Multiple SBI with different Provider | 00:00:01 |
| TC_PMS_MapDeviceWithSBI_03 | MapDevice Partner With Multiple SBI | 00:00:01 |
| RemoveMapDeviceWithSBI — Passed | ||
| TC_PMS_RemoveMapDeviceWithSBI_01 | Remove Partner Mapped Device with SBI | 00:00:01 |
| ApproveMappingDeviceToSbi — Passed | ||
| TC_PMS_ApproveMappingDevice_01 | Approve Mapping Device To Sbi | 00:00:01 |
| TC_PMS_ApproveMappingDevice_02 | Approve Mapping Device To Sbi | 00:00:01 |
| ApproveMappingDeviceToSbiNegativeScenarios — Passed | ||
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_01 | Approve mapping device to sbi with different deviceDetails | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_09 | Approve mapping device to sbi by providing parameters which are already approved | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_10 | Approve mapping device to sbi by providing invalid Device ID | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_13 | Approve mapping device to sbi with Invalid Partner Authentication | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_11 | Approve mapping device to sbi by providing invalid SBI ID | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_08 | Approve mapping device to sbi while keeping SBI ID parameter as missing | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_06 | Approve mapping device to sbi with randome Device provider Id | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_12 | Approve mapping device to sbi without Partner Authentication | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_03 | Approve mapping device to sbi without Request ID | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_07 | Approve mapping device to sbi without requestTime | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_02 | Approve mapping device to sbi without without sbiId value | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_04 | Approve mapping device to sbi without Version value | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_05 | Approve mapping device to sbi without Device provider Id | 00:00:01 |
| RejectMappingDeviceToSbi — Passed | ||
| TC_PMS_RejectMappingDeviceToSbi_01 | Reject Mapping Device To Sbi | 00:00:01 |
| RejectMappingDeviceToSbiwhichisRejected — Passed | ||
| TC_PMS_RejectMappingDeviceToSbi_32 | Reject mapping device to sbi by providing SBI which is Rejected and expecting an error in response | 00:00:01 |
| RejectMappingDeviceToSbiNegativeScenarios — Passed | ||
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_03 | Reject mapping device to sbi while keeping ReqID parameter as Null in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_29 | Reject mapping device to sbi while keeping device ID as Empty in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_19 | Reject mapping device to sbi while keeping Empty Partner ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_14 | Reject mapping device to sbi while keeping RequestTime parameter as Empty string in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_13 | Reject mapping device to sbi while keeping RequestTime parameter as Empty in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_23 | Reject mapping device to sbi while keeping Empty SBI ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_08 | Reject mapping device to sbi while keeping Version parameter as Empty in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_20 | Reject mapping device to sbi while keeping Invalid SBI ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_10 | Reject mapping device to sbi while keeping Version parameter as invalid value 0 in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_09 | Reject mapping device to sbi while keeping Version parameter as invalid value 1 in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_11 | Reject mapping device to sbi while keeping Version parameter as invalid values in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_02 | Reject mapping device to sbi while passing Invalid RequestID parameter in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_06 | Reject mapping device to sbi while keeping Version parameter as Missing in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_07 | Reject mapping device to sbi while keeping Version parameter as Null in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_33 | Reject mapping device to sbi with different SBI ID and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_04 | Reject mapping device to sbi while keeping ReqID parameter as Empty in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_05 | Reject mapping device to sbi while keeping ReqID parameter as Invalid in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_25 | Reject mapping device to sbi while providing already rejeceted device ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_15 | Reject mapping device to sbi while keeping RequestTime value other than given format in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_26 | Reject mapping device to sbi while providing invalid device ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_30 | Reject mapping device to sbi while keeping device ID values in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_17 | Reject mapping device to sbi while keeping invalid Partner ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_16 | Reject mapping device to sbi with invalid object paramter in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_28 | Reject mapping device to sbi while keeping device ID as null in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_18 | Reject mapping device to sbi while keeping null Partner ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_22 | Reject mapping device to sbi while keeping null SBI ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_24 | Reject mapping device to sbi while keeping random SBI ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_31 | Reject mapping device to sbi with Parter roles and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_27 | Reject mapping device to sbi with different device ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_01 | Reject mapping device to sbi without Partner Authentication and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_12 | Reject mapping device to sbi without RequestTime parameter in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_21 | Reject mapping device to sbi while keeping without SBI ID in request and expecting an error in response | 00:00:01 |
| ApproveMappingDeviceToSbiwhichisRejected — Passed | ||
| TC_PMS_ApproveMappingDevice_14 | Approve Mapping Device To Sbi when SBI is Rejected | 00:00:01 |
| GetAllDeviceListMappedWithSbi — Passed | ||
| TC_PMS_GetAllDeviceListMappedwithSbi_01 | Get All Device List Mapped With Sbi | 00:00:01 |
| GetAllDeviceListMappedWithSbiNegativeScenarios — Passed | ||
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_02 | Retrieve all Device list which are mapped with SBI by provinding invalid SBI id in request | 00:00:01 |
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_03 | Retrieve all Device list when SBI given is different from the authentiacted device provider | 00:00:01 |
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_01 | Retrieve all Device list which are mapped with SBI without Authentication | 00:00:01 |
| DeactivateSBIwhichisPendingforApproval — Passed | ||
| TC_PMS_DeactivateSBIWithAssociatedDevices_21 | Deactivate SBI which is pending for approval | 00:00:01 |
| GetPartnersPolicy — Passed | ||
| TC_PMS_GetPartnersPolicy_01 | Retrieve Partner Policy details | 00:00:01 |
| TC_PMS_GetPartnersPolicy_02 | Retrieve Partners Policy details while keeping invalid PartnerId | 00:00:01 |
| GetAllPolicyGroup — Passed | ||
| TC_PMS_GetAllPolicyGroup_01 | Retrieve All Partner Policy Group | 00:00:04 |
| CreateSearchPolicyGroup — Passed | ||
| TC_PMS_createSearchPolicyGroup_01 | Create Search Policy Group with all valid details | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_02 | Create Search Policy Group with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_04 | Create Search Policy Group with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_03 | Create Search Policy Group with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_12 | Create Search Policy Group while keeping columnName parameter as id and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_11 | Create Search Policy Group while keeping columnName parameter as id and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_05 | Create Search Policy Group while keeping Type parameter as contains and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_06 | Create Search Policy Group while keeping Type parameter as contains and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_08 | Create Search Policy Group while keeping Type parameter as equals and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_07 | Create Search Policy Group while keeping Type parameter as equals and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_09 | Create Search Policy Group while keeping Type parameter as startswith and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_10 | Create Search Policy Group while keeping Type parameter as startswith and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_13 | Create Search Policy Group while keeping columnName parameter as empty | 00:00:01 |
| PolicyGroupFilter — Passed | ||
| TC_PMS_PolicyGroupFilter_06 | Create Policy Group Filter for Partner while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_PolicyGroupFilter_05 | Create Policy Group Filter for Partner while keeping ColumnName parameter as Empty | 00:00:01 |
| TC_PMS_PolicyGroupFilter_04 | Create Policy Group Filter for Partner while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_PolicyGroupFilter_07 | Create Policy Group Filter for Partner while keeping invalid values in Type parameter | 00:00:01 |
| TC_PMS_PolicyGroupFilter_02 | Create Policy Group Filter for Partner with valid values | 00:00:01 |
| TC_PMS_PolicyGroupFilter_01 | Create Policy Group Filter for Partner using valid name | 00:00:01 |
| TC_PMS_PolicyGroupFilter_03 | Create Policy Group Filter for Partner while keeping valid name for coulmnname parameter | 00:00:01 |
| GetValueForConfigKey — Passed | ||
| TC_PMS_GetValueForConfigKey_02 | Retrieve valid Value For Config Key keeping invalid Key | 00:00:01 |
| PartnerFilter — Passed | ||
| TC_PMS_PartnerFilter_04 | Create Partner Filter while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_PartnerFilter_03 | Create Partner Filter while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_PartnerFilter_06 | Create Partner Filter while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_PartnerFilter_05 | Create Partner Filter while keeping invalid values in Type parameter | 00:00:01 |
| TC_PMS_PartnerFilter_02 | Create Partner Filter while keeping Type parameter as All | 00:00:01 |
| TC_PMS_PartnerFilter_01 | Create Partner Filter while keeping Type parameter as Unique | 00:00:01 |
| SearchPartnerApiKey — Passed | ||
| TC_PMS_SearchPartnerApiKey_01 | Create Search Partner API Key with valid data | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_02 | Create Search Partner API Key with Only FilterCriteria | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_04 | Create Search Partner API Key with Only PaginationCriteria | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_03 | Create Search Partner API Key with Only SortCriteria | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_05 | Create Search Partner API Key while keeping Type parameter as contains and filter data in ascending order | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_09 | Create Search Partner API Key while keeping Type parameter as contains and invalid columnName | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_06 | Create Search Partner API Key while keeping Type parameter as contains and invalid pagination | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_07 | Create Search Partner API Key while keeping Type parameter as contains and invalid sortField | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_08 | Create Search Partner API Key while keeping Type parameter as contains and invalid sortType | 00:00:01 |
| SearchPartnerApiRequestKey — Passed | ||
| TC_PMS_SearchPartnerApiRequestKey_01 | Create Search Partner API Request Key with valid data | 00:00:01 |
| TC_PMS_SearchPartnerApiRequestKey_02 | Create Search Partner API Request Key with Only FilterCriteria | 00:00:01 |
| TC_PMS_SearchPartnerApiRequestKey_04 | Create Search Partner API Request Key with Only PaginationCriteria | 00:00:01 |
| TC_PMS_SearchPartnerApiRequestKey_03 | Create Search Partner API Request Key with Only SortCriteria | 00:00:01 |
| TC_PMS_SearchPartnerApiRequestKey_05 | Create Search Partner API Request Key while keeping Type parameter as contains and filter data in ascending order | 00:00:01 |
| TC_PMS_SearchPartnerApiRequestKey_06 | Create Search Partner API Request Key while keeping Type parameter as contains and invalid pagination | 00:00:01 |
| PartnerApiKeyRequestFilter — Passed | ||
| TC_PMS_PartnerApiKeyRequestFilter_01 | Create ApiKeyRequestFilter for Partner with valid values | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_05 | Create ApiKeyRequestFilter for Partner while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_04 | Create ApiKeyRequestFilter for Partner while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_03 | Create ApiKeyRequestFilter for Partner while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_06 | Create ApiKeyRequestFilter for Partner while keeping invalid values in Type parameter | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_02 | Create ApiKeyRequestFilter for Partner with valid values | 00:00:01 |
| CreateSearchPartnerType — Passed | ||
| TC_PMS_createSearchPartnerType_02 | Create Search Partner Type with all valid data | 00:00:01 |
| TC_PMS_createSearchPartnerType_03 | Create Search Partner Type with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchPartnerType_05 | Create Search Partner Type with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchPartnerType_04 | Create Search Partner Type with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchPartnerType_01 | Create Search Partner Type with valid data | 00:00:01 |
| TC_PMS_createSearchPartnerType_06 | Create Search Partner Type while keeping Type parameter as contains and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPartnerType_08 | Create Search Partner Type while keeping Type parameter as contains and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPartnerType_07 | Create Search Partner Type while keeping Type parameter as equals and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPartnerType_09 | Create Search Partner Type while keeping Type parameter as startswith and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPartnerType_10 | Create Search Partner Type while keeping Type parameter as startswith and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPartnerType_13 | Create Search Partner Type while keeping columnName parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartnerType_18 | Create Search Partner Type while keeping sortField parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartnerType_16 | Create Search Partner Type while keeping sortType parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartnerType_11 | Create Search Partner Type while keeping Value parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartnerType_12 | Create Search Partner Type while keeping value parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartnerType_14 | Create Search Partner Type while keeping columnName parameter as empty | 00:00:01 |
| TC_PMS_createSearchPartnerType_19 | Create Search Partner Type while keeping sortField parameter as empty | 00:00:01 |
| TC_PMS_createSearchPartnerType_17 | Create Search Partner Type while keeping sortType parameter as empty | 00:00:01 |
| TC_PMS_createSearchPartnerType_15 | Create Search Partner Type while keeping Type parameter as empty | 00:00:01 |
| GetAllApprovedFtmProvider — Passed | ||
| Pms_All_Approved_Ftm_Provider_AllValid_Smoke | Fetching all the certificate for the Partner Id | 00:00:01 |
| GetAllApprovedFtmProviderNegativeScenarios — Passed | ||
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_03 | Retrieve all approved FTM Providers before uploading CA certificates | 00:00:01 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_04 | Retrieve all approved FTM Providers before uploading Partner certificate | 00:00:01 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_02 | Retrieve all approved FTM Providers with Invalid access token | 00:00:01 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_01 | Retrieve all approved FTM Providers without Partner authentication | 00:00:01 |
| GetListAllFTMChipNegativeScenarios — Passed | ||
| TC_PMS_GetListAllFTMChipNegativeScenarios_02 | Retrieve all FTM chip details with Invalid access token | 00:00:01 |
| TC_PMS_GetListAllFTMChipNegativeScenarios_03 | Retrieve all FTM chip details when FTM Chips are not added for Partner | 00:00:01 |
| TC_PMS_GetListAllFTMChipNegativeScenarios_05 | Retrieve all FTM chip details wwith Device Partner token | 00:00:01 |
| CreateFtmChipDetails — Passed | ||
| TC_PMS_CreateFTPChipDetail_01 | Create FTP Chip Deatils for Partner | 00:00:01 |
| TC_PMS_CreateFTPChipDetail_03 | Create FTP Chip Deatils for Partner while keeping ftpId parameter as missing | 00:00:01 |
| TC_PMS_CreateFTPChipDetail_02 | Create FTP Chip Deatils for Partner while keeping ftpProviderId parameter as missing | 00:00:01 |
| TC_PMS_createFtmChipDetails_01 | Create Ftm Chip Details | 00:00:01 |
| UpdateFtpChipDetail — Passed | ||
| TC_PMS_UpdateFtpChipDetail_01 | Update FTP Chip detail for Partner with valid details | 00:00:01 |
| TC_PMS_UpdateFtpChipDetail_02 | Update FTP Chip detail for Partner while keeping ftpChipDetailId parameter as missing | 00:00:01 |
| GetOriginalFtmCertifacteNegativeScenariosBeforeUploadCert — Passed | ||
| TC_PMS_GetOriginalFtmCertifacte_01 | Retrieve Original FTM Certifacte with valid Partner ID | 00:00:01 |
| DeactivateFtmwhichisPendingforCertUpload — Passed | ||
| TC_PMS_DeactivateFtm_20 | Deactivate FTM which is Pending for Approval | 00:00:01 |
| GetOriginalFtmCertifacteforPendingforCertUpload — Passed | ||
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_07 | Retrieve Original FTM Certifacte for Pending for Certificate Upload | 00:00:01 |
| UploadCertificateOfFtpChip — Passed | ||
| TC_PMS_UploadCertificateOfFtpChip_01 | Upload FTP chip Certificate | 00:00:01 |
| TC_PMS_UploadCertificateOfFtpChip_02 | Upload Certificate for FTP chip provider Partner while keeping ftpChipId parameter as invalid | 00:00:01 |
| TC_PMS_UploadCertificateOfFtpChip_01 | Upload Certificate for FTP chip provider Partner while keeping ftpProviderId parameter as invalid | 00:00:01 |
| DeactivateFtmwhichisPendingforApproval — Passed | ||
| TC_PMS_DeactivateFtm_19 | Deactivate FTM which is Pending for Approval | 00:00:01 |
| ApproveFTMChipDetail — Passed | ||
| TC_PMS_ApproveFTMchipDetail_01 | Approve FTM Chip Detail | 00:00:01 |
| TC_PMS_ApproveFtpChipDetail_02 | Update FTM Chip provider Partner while keeping ftpChipDetailID as missing | 00:00:01 |
| RejectFtpChipDetail — Passed | ||
| TC_PMS_rejectFtpChipDetail_01 | Reject FTP Chip detail for Partner | 00:00:01 |
| TC_PMS_rejectFtpChipDetail_02 | Reject FTP Chip detail for Partner while keeping ftpChipDetailId paramter as missing | 00:00:01 |
| GetFTPChipDetail — Passed | ||
| TC_PMS_GetFTPChipDetail_01 | Retreive FTP ChipDetails Partner with valid detail | 00:00:01 |
| GetListAllFTMChip — Passed | ||
| TC_PMS_GetListAllFTMChip_01 | Retrieve all FTM chip details with valid details | 00:00:01 |
| GetOriginalFtmCertifacte — Passed | ||
| TC_PMS_GetOriginalFtmCertifacte_01 | Retrieve Original FTM Certifacte with valid Partner ID | 00:00:01 |
| GetOriginalFtmCertifacteNegativeScenarios — Passed | ||
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_05 | Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_06 | Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_04 | Retrieve Original FTM Certifacte while keeping FTM ID parameter as Missing and expecting an error in the response | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_02 | Retrieve Original FTM Certifacte with invalid partner access token and expecting an error in the response | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_01 | Retrieve Original FTM Certifacte without partner Authentication and expecting an error in the response | 00:00:01 |
| GetListOfFtmChip — Passed | ||
| TC_PMS_FTM_chip_03 | Fetching all the ftpchipdetail | 00:00:01 |
| TC_PMS_FTM_chip_18 | Fetching all the ftpchipdetail for make value contains 'abcd' | 00:00:01 |
| TC_PMS_FTM_chip_19 | Fetching all the ftpchipdetail for model value contains 'xyz' | 00:00:01 |
| TC_PMS_FTM_chip_08 | Fetching all the ftpchipdetail for orgName which contains '1' | 00:00:01 |
| TC_PMS_FTM_chip_17 | Fetching all the ftpchipdetail for pageSize specified | 00:00:01 |
| TC_PMS_FTM_chip_09 | Fetching all the ftpchipdetail for partnerId which contains 'a' | 00:00:01 |
| TC_PMS_FTM_chip_20 | Fetching all the ftpchipdetail by giving random value for partnerId | 00:00:01 |
| TC_PMS_FTM_chip_06 | Fetching all the ftpchipdetail by sort type ASC for the given sort field | 00:00:01 |
| TC_PMS_FTM_chip_07 | Fetching all the ftpchipdetail by sort type DESC for the given sort field | 00:00:01 |
| TC_PMS_FTM_chip_11 | Fetching all the ftpchipdetail for status as approved | 00:00:01 |
| TC_PMS_FTM_chip_12 | Fetching all the ftpchipdetail for status as deactivated | 00:00:01 |
| TC_PMS_FTM_chip_14 | Fetching all the ftpchipdetail for status as pending_approval | 00:00:01 |
| TC_PMS_FTM_chip_13 | Fetching all the ftpchipdetail for status as pending_cert_upload | 00:00:01 |
| TC_PMS_FTM_chip_10 | Fetching all the ftpchipdetail for status as rejected | 00:00:01 |
| TC_PMS_FTM_chip_21 | Fetching all the ftpchipdetail by giving value for both make and model | 00:00:01 |
| GetListOfFtmChipNegativeScenarios — Passed | ||
| TC_PMS_FTM_chip_16 | Fetching all the ftpchipdetail with negative pageNo | 00:00:01 |
| TC_PMS_FTM_chip_15 | Fetching all the ftpchipdetail with negative pagesize | 00:00:01 |
| TC_PMS_FTM_chip_05 | Fetching all the ftpchipdetail with invalid sortType | 00:00:01 |
| TC_PMS_FTM_chip_04 | Fetching all the ftpchipdetail with invalid sortfieldname | 00:00:01 |
| TC_PMS_FTM_chip_02 | Fetching all the ftpchipdetail with invalid token | 00:00:01 |
| TC_PMS_FTM_chip_01 | Fetching all the ftpchipdetail without authentication | 00:00:01 |
| GetListOfAllSBINegativeScenarios — Passed | ||
| TC_PMS_SBI_List_11 | Fetching all the SBI with invalid orgName | 00:00:01 |
| TC_PMS_SBI_List_12 | Fetching all the SBI with invalid sbiID | 00:00:01 |
| TC_PMS_SBI_List_13 | Fetching all the SBI with invalid sbiVersion | 00:00:01 |
| TC_PMS_SBI_List_15 | Fetching all the SBI by selecting only sortFieldName without selecting sortType and sortFieldName | 00:00:01 |
| TC_PMS_SBI_List_16 | Fetching all the SBI by selecting only sortType without selecting sortFieldName | 00:00:01 |
| TC_PMS_SBI_List_10 | Fetching all the SBI Version with passing Special Character | 00:00:01 |
| TC_PMS_SBI_List_08 | Fetching all the active SBI with negative pageNo value | 00:00:01 |
| TC_PMS_SBI_List_09 | Fetching all the active SBI with invalid sortFieldName | 00:00:01 |
| TC_PMS_SBI_List_05 | Fetching all the active SBI with invalid sortType | 00:00:01 |
| TC_PMS_SBI_List_04 | Fetching all the active SBI with invalid sortfield | 00:00:01 |
| TC_PMS_SBI_List_02 | Fetching all the active SBI with invalid token | 00:00:01 |
| TC_PMS_SBI_List_07 | Fetching all the active SBI with negative pageNo value | 00:00:01 |
| TC_PMS_SBI_List_06 | Fetching all the active SBI with negative pagesize value | 00:00:01 |
| TC_PMS_SBI_List_01 | Fetching all the active SBI without Authentication | 00:00:01 |
| GetListOfAllDevice — Passed | ||
| TC_PMS_devicedetails_01 | Fetching list of all the devices | 00:00:01 |
| TC_PMS_devicedetails_22 | Fetching list of all the devices with deviceId given as '9' | 00:00:01 |
| TC_PMS_devicedetails_24 | Fetching list of all the devices with random value given for deviceid | 00:00:01 |
| TC_PMS_devicedetails_18 | Fetching list of all the devices with deviceSubType given as 'i' | 00:00:01 |
| TC_PMS_devicedetails_17 | Fetching list of all the devices with deviceType given as 'i' | 00:00:01 |
| TC_PMS_devicedetails_16 | Fetching list of all the devices with invalid sortFieldName | 00:00:01 |
| TC_PMS_devicedetails_12 | Fetching list of all the devices with invalid sorttype | 00:00:01 |
| TC_PMS_devicedetails_03 | Fetching list of all the devices with invalid token | 00:00:01 |
| TC_PMS_devicedetails_19 | Fetching list of all the devices with make given as '3' | 00:00:01 |
| TC_PMS_devicedetails_20 | Fetching list of all the devices with model given as '4' | 00:00:01 |
| TC_PMS_devicedetails_23 | Fetching list of all the devices with make and model is given | 00:00:01 |
| TC_PMS_devicedetails_05 | Fetching list of all the devices with negative pageno | 00:00:01 |
| TC_PMS_devicedetails_06 | Fetching list of all the devices with negative pageSize | 00:00:01 |
| TC_PMS_devicedetails_21 | Fetching list of all the devices with sbiId given as 'q' | 00:00:01 |
| TC_PMS_devicedetails_15 | Fetching list of all the devices with sbiVersion given as 'abcd' | 00:00:01 |
| TC_PMS_devicedetails_13 | Fetching list of all the devices with sorttype as 'asc' | 00:00:01 |
| TC_PMS_devicedetails_14 | Fetching list of all the devices with sorttype as 'desc' | 00:00:01 |
| TC_PMS_devicedetails_25 | Fetching list of all the devices with orgName value given as '1' | 00:00:01 |
| TC_PMS_devicedetails_04 | Fetching list of all the devices with pagesize specified | 00:00:01 |
| TC_PMS_devicedetails_11 | Fetching list of all the devices with partnerid value given as 'a' | 00:00:01 |
| TC_PMS_devicedetails_08 | Fetching list of all the devices with status as approved | 00:00:01 |
| TC_PMS_devicedetails_09 | Fetching list of all the devices with status as deactivated | 00:00:01 |
| TC_PMS_devicedetails_10 | Fetching list of all the devices with status as pending_approval | 00:00:01 |
| TC_PMS_devicedetails_07 | Fetching list of all the devices with status as rejected | 00:00:01 |
| TC_PMS_devicedetails_02 | Fetching list of all the devices without authentication | 00:00:01 |
| GetCountOfFtm — Passed | ||
| Pms_GetCountOfFtm_All_Valid_Smoke | Fetching all active FTM | 00:00:01 |
| GetAllSystemConfigs — Passed | ||
| TC_PMS_GetAllSystemConfigs_01 | Fetching all the configuration for PMS | 00:00:01 |
| TC_PMS_GetAllSystemConfigs_02 | Fetching all the configuration for PMS without authentication | 00:00:01 |
| GetAllRootCertificate — Passed | ||
| Pms_GetAllRootCertificate_allValid_smoke | Fetching all the root certificates of the Logged in Partner | 00:00:01 |
| GetListOfApiKey — Passed | ||
| TC_PMS_GetListOfApiKey_01 | Fetching all the API Keys | 00:00:01 |
| TC_PMS_GetListOfApiKey_03 | Fetching the API Keys with individual partner | 00:00:01 |
| TC_PMS_GetListOfApiKey_04 | Fetching the API Keys with pageSize | 00:00:01 |
| TC_PMS_GetListOfApiKey_11 | Fetching the API Keys with invalid sortType | 00:00:01 |
| TC_PMS_GetListOfApiKey_05 | Fetching the API Keys with negative pageNo | 00:00:01 |
| TC_PMS_GetListOfApiKey_06 | Fetching the API Keys with negative pageSize | 00:00:01 |
| TC_PMS_GetListOfApiKey_16 | Fetching the API Keys with partial apiKeyLabel values | 00:00:01 |
| TC_PMS_GetListOfApiKey_14 | Fetching the API Keys with partial orgName value | 00:00:01 |
| TC_PMS_GetListOfApiKey_09 | Fetching the API Keys on passing partial partnerId value | 00:00:01 |
| TC_PMS_GetListOfApiKey_10 | Fetching the API Keys on passing partial policyGroupName value | 00:00:01 |
| TC_PMS_GetListOfApiKey_15 | Fetching the API Keys with partial policyName values | 00:00:01 |
| TC_PMS_GetListOfApiKey_17 | Fetching the API Keys with random values given to a valid parameter | 00:00:01 |
| TC_PMS_GetListOfApiKey_07 | Fetching the API Keys with status activated | 00:00:01 |
| TC_PMS_GetListOfApiKey_08 | Fetching the API Keys with status deactivated | 00:00:01 |
| TC_PMS_GetListOfApiKey_12 | Fetching the API Keys with ascending sortType | 00:00:01 |
| TC_PMS_GetListOfApiKey_13 | Fetching the API Keys with ascending sortType | 00:00:01 |
| TC_PMS_GetListOfApiKey_02 | Fetching the API Keys without authentication | 00:00:01 |
| DownloadRootCertificate — Passed | ||
| Pms_DownloadRootCertificate_allValid_smoke | Fetching all the root certificates of the Logged in Partner | 00:00:01 |
| GenerateMISPPartnerLicense — Passed | ||
| TC_PMS_GenerateMISPPartnerLicense_01 | Generate MISP Partner License | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicense_02 | Generate MISP Partner License without PolicyID and user should be able to generate the license | 00:00:01 |
| GenerateMISPPartnerLicenseNegativeScenarios — Passed | ||
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_20 | Generate MISP Partner License with already registered licenseKeyName | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_17 | Generate MISP Partner License with Empty licenseKeyName | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_05 | Generate MISP Partner License Empty request ID | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_18 | Generate MISP Partner License with Empty expiryDate | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_14 | Generate MISP Partner License with Empty partnerId | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_02 | Generate MISP Partner License with invalid request ID | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_06 | Generate MISP Partner License invalid version | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_13 | Generate MISP Partner License with invalid partnerId | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_04 | Generate MISP Partner License Null request ID | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_08 | Generate MISP Partner License without version | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_19 | Generate MISP Partner License with Past expiryDate | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_10 | Generate MISP Partner License version value 0 | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_09 | Generate MISP Partner License version value 1 | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_16 | Generate MISP Partner License with invalid licenseKeyName | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_15 | Generate MISP Partner License with null partnerId | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_11 | Generate MISP Partner License with past request time | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_01 | Generate MISP Partner License without access Token | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_03 | Generate MISP Partner License without request ID | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_07 | Generate MISP Partner License without version | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_12 | Generate MISP Partner License with past request time | 00:00:01 |
| GetMISPPartnerLicense — Passed | ||
| TC_PMS_GetMISPPartnerLicense_01 | Fetch MISP partner license using a valid access token | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_03 | Fetch MISP partner license using a valid partnerId | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_11 | Fetch MISP partner license using default pagination settings | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_09 | Fetch MISP partner license using a valid MispLicenseKeyName | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_02 | Fetch all MISP license keys without passing any query parameters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_06 | Fetch MISP partner license using a valid OrgName | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_10 | Fetch MISP partner license using pagination with 2 records per page | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_07 | Fetch MISP partner license using a valid PolicyGroupName | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_08 | Fetch MISP partner license using a valid PolicyName | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_12 | Fetch MISP partner licenses sorted by mispLicenseKeyName in ascending order | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_13 | Fetch MISP partner licenses sorted by mispLicenseKeyName in descending order | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_04 | Fetch MISP partner license with status set to ACTIVE | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_05 | Fetch MISP partner license with status set to DEACTIVATED | 00:00:01 |
| GetMISPPartnerLicenseNegTC — Passed | ||
| TC_PMS_GetMISPPartnerLicenseNegTC_22 | Fetching MISP Partner License when PolicyGroupName is Empty | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_23 | Fetching MISP Partner License when PolicyName is Empty | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_10 | Fetching MISP Partner License with Invalid MispLicenseKeyName | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_04 | Fetching MISP Partner License with Invalid OrgName | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_17 | Fetching MISP Partner License with Invalid format of PageNo | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_12 | Fetching MISP Partner License with Invalid PageNo | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_14 | Fetching MISP Partner License with Invalid format of PageSize | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_02 | Fetching MISP Partner License with Invalid PartnerId | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_06 | Fetching MISP Partner License with Invalid PolicyGroupName | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_08 | Fetching MISP Partner License with Invalid PolicyName | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_13 | Fetching MISP Partner License with Negative PageNo | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_16 | Fetching MISP Partner License with Negative PageSize | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_20 | Fetching MISP Partner License when SortFieldName is used with an invalid SortType | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_19 | Fetching MISP Partner License when SortType is provided without SortFieldName | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_11 | Fetching MISP Partner License using MispLicenseKeyName with special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_05 | Fetching MISP Partner License using OrgName when OrgName has special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_03 | Fetching MISP Partner License using OrgName when PartnerId has special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_07 | Fetching MISP Partner License using PolicyName when PolicyGroupName has special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_09 | Fetching MISP Partner License using PolicyName when PolicyName has special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_21 | Fetching MISP Partner License using when SortFieldName has special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_18 | Fetching MISP Partner License with Valid OrgName and Invalid PolicyGroupName | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_15 | Fetching MISP Partner License with Zero PageSize | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_01 | Fetching MISP Partner License without Access Token | 00:00:01 |
| GetMISPPartnerLicenseByPartnerId — Passed | ||
| TC_PMS_GetMISPPartnerLicenseByPartnerId_01 | Fetching MISP partner license details by Partner ID using a valid access token | 00:00:01 |
| GetMISPPartnerLicenseByPartnerIdNegTC — Passed | ||
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_04 | Fetching MISP partner license details by using Auth Partner ID | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_07 | Fetching MISP partner license details using Different organisation Partner ID | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_01 | Fetching MISP partner license details by Partner ID using invalid access token | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_03 | Fetching MISP partner license details by Partner ID using invalid PartnerId | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_06 | Fetching MISP partner license details using Not Registered Partner ID | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_08 | Fetching MISP partner license details using Not uploaded certificate Partner ID | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_05 | Fetching MISP partner license details by Partner ID without LicenseKeyName | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_02 | Fetching MISP partner license details by giving Partner ID is null | 00:00:01 |
| SearchMispLicense — Passed | ||
| TC_PMS_SearchMispLicense_07 | Create Search Misp License with Empty Sort Field | 00:00:01 |
| TC_PMS_SearchMispLicense_03 | Create Search Misp License with invalid Page fetch | 00:00:01 |
| TC_PMS_SearchMispLicense_04 | Create Search Misp License with invalid Page Start | 00:00:01 |
| TC_PMS_SearchMispLicense_06 | Create Search Misp License with invalid SortField | 00:00:01 |
| TC_PMS_SearchMispLicense_05 | Create Search Misp License with invalid SortType | 00:00:01 |
| TC_PMS_SearchMispLicense_02 | Create Search Misp License with valid Filter Name | 00:00:01 |
| TC_PMS_SearchMispLicense_01 | Create Search Misp License with valid details | 00:00:01 |
| FilterMispLicense — Passed | ||
| TC_PMS_FilterMispLicense_01 | Create MispLicense Filter for Partner while keeping Type All | 00:00:01 |
| TC_PMS_FilterMispLicense_04 | Create MispLicense Filter for Partner while keeping Type parameter as Empty | 00:00:01 |
| TC_PMS_FilterMispLicense_06 | Create MispLicense Filter for Partner while keeping ColumnName parameter as Empty | 00:00:01 |
| TC_PMS_FilterMispLicense_03 | Create MispLicense Filter for Partner while keeping Text parameter as Empty | 00:00:01 |
| TC_PMS_FilterMispLicense_05 | Create MispLicense Filter for Partner while keeping ColumnName parameter as Invalid | 00:00:01 |
| TC_PMS_FilterMispLicense_02 | Create MispLicense Filter for Partner while keeping Type Unique | 00:00:01 |
| GetPartnerApiKeyRequest — Passed | ||
| TC_PMS_GetPartnerApiKeyRequest_01 | Retrieve ApiKeyRequests for Partner while keeping invalid PartnerId | 00:00:01 |
| GetBioExtractors — Passed | ||
| TC_PMS_GetBioExtractors_02 | Retrieve Bio Extractors for Partner while keeping invalid PartnerId | 00:00:01 |
| TC_PMS_GetBioExtractors_01 | Retrieve Bio Extractors for Partner | 00:00:01 |
| CreateBioExtractors — Passed | ||
| TC_PMS_CreateBioExtractors_02 | Create BioExtractors for Partner with invalid PolicyID | 00:00:01 |
| TC_PMS_CreateBioExtractors_01 | Create BioExtractors for Partner with invalid PartnerID | 00:00:01 |
| MapPartnerAndPolicytoCredentialType — Passed | ||
| TC_PMS_MapPartnerAndPolicytoCredentialType_01 | Create Mapping between Partner and Policy to CredentialType Partner | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_04 | Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid CredentialType | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_02 | Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid PartnerId | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_03 | Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid PolicyId | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_05 | Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid inactive Policy | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_06 | Create Mapping between Partner and Policy to CredentialType Partner while keeping duplicate PartnerId | 00:00:01 |
| GetPolicyforMappedPartnerAndCredentialtype — Passed | ||
| TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_01 | Retrieve Partner Policy for MappedPartner and CredentialType Partner | 00:00:01 |
| TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_03 | Retrieve Partner Policy for MappedPartner and CredentialType Partner while keeping invalid CredentialType | 00:00:01 |
| TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_02 | Retrieve Partner Policy for MappedPartner and CredentialType Partner while keeping invalid PartnerId | 00:00:01 |
| GetRoles — Passed | ||
| TC_PMS_GetRoles_01 | Retrieve all Partner Roles | 00:00:01 |
| ActivateDeactivatePartner — Passed | ||
| TC_PMS_ActivateDeactivatePartner_05 | Update the status for Activated Partner as Activate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_02 | Update the status for Deactivated MISP Partner as Deactivate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_03 | Update the status for Deactivated Tech-1233 Partner as Deactivate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_04 | Update the status for Deactivated Tech-321 Partner as Deactivate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_01 | Update the status for Deactivated Partner as Deactivate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_06 | Update the status for Deactivated Partner as Deactivate for Invalid PartnerID | 00:00:01 |
| GetApiKeyRequests — Passed | ||
| TC_PMS_GetApiKeyRequests_01 | Retrieve ApiKeyRequests for Partner | 00:00:01 |
| AuditLogGenerateApiKey — Passed | ||
| TC_PMS_addContact_01 | Get the AuditLogs for add contact scenario | 00:00:34 |
| GetPolicyForApiKey — Passed | ||
| TC_PMS_GetPolicyForApiKey_03 | Retrieve Partner Policy API Key while keeping invalid APIKey | 00:00:01 |
| TC_PMS_GetPolicyForApiKey_02 | Retrieve Partner Policy API Key while keeping invalid PartnerId | 00:00:01 |
| TC_PMS_GetPolicyForApiKey_01 | Retrieve Partner Policy API Key | 00:00:01 |
| UpdatePolicyAgainstApiKey — Passed | ||
| TC_PMS_UpdatePolicyAgainstApiKey_01 | Update Policy Against ApiKey with valid details | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_04 | Update Policy Against ApiKey with invalid OldPolicyId | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_03 | Update Policy Against ApiKey with invalid ApiKey | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_05 | Update Policy Against ApiKey with invalid NewPolicyId | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_02 | Update Policy Against ApiKey with invalid PartnerId | 00:00:01 |
| AuditLogPartnerApiKey_ — Passed | ||
| TC_PMS_addContact_01 | Get the AuditLogs for add contact scenario | 00:00:26 |
| UpdatePolicyGroupForPartner — Passed | ||
| TC_PMS_UpdatePolicyGroupForPartner_01 | Update Policy Group For Partner with valid data | 00:00:01 |
| TC_PMS_UpdatePolicyGroupForPartner_02 | Update Policy Group For Partner with invalid Approved Partner | 00:00:01 |
| TC_PMS_UpdatePolicyGroupForPartner_04 | Update Policy Group For Partner with invalid Policy GroupId | 00:00:01 |
| TC_PMS_UpdatePolicyGroupForPartner_03 | Update Policy Group For Partner with invalid PartnerId | 00:00:01 |
| AuditLogUpdatePolicyGroupForPartner — Passed | ||
| TC_PMS_addContact_01 | Get the AuditLogs for add contact scenario | 00:00:11 |
| DBValidator — Passed | ||
| TC_PMS_DBValidator_03 | Create Data in database using APIKEY with valid details | 00:00:01 |
| TC_PMS_DBValidator_04 | Create Data in database using MISPLicense with valid details | 00:00:01 |
| TC_PMS_DBValidator_01 | Create Data in database using PMS with valid details | 00:00:01 |
| TC_PMS_DBValidator_02 | Create Data in database using Policy with valid details | 00:00:01 |
| RegenerateMISPPartnerLicense — Passed | ||
| TC_PMS_RegenerateMISPPartnerLicense_01 | Regenerating MISP Partner License with valid Access Token | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicense_02 | Regenerating MISP Partner License without PolicyId | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicense_04 | Regenerating MISP Partner License with valid License Key Name | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicense_03 | Regenerating MISP Partner License with valid PolicyId | 00:00:01 |
| RegenerateMISPPartnerLicenseNegTC — Passed | ||
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_01 | Regenerating MISP Partner License without Access Token | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_11 | Regenerating MISP Partner License with empty expiry date | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_06 | Regenerating MISP Partner License with empty LicenseKeyName | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_17 | Regenerating MISP Partner License with Empty RequestTime | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_14 | Regenerating MISP Partner License with Empty ExpiryDate field | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_09 | Regenerating MISP Partner License with existing LicenseKeyName | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_10 | Regenerating MISP Partner License with expiry date less than current date | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_03 | Regenerating MISP Partner License with Invalid PartnerID format | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_02 | Regenerating MISP Partner License with Invalid PartnerID | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_18 | Regenerating MISP Partner License with Invalid RequestTime | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_15 | Regenerating MISP Partner License with Invalid Request id | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_16 | Regenerating MISP Partner License with Invalid Version | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_07 | Regenerating MISP Partner License with licenseKeyName exceeding maximum allowed length | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_13 | Regenerating MISP Partner License with missing ExpiryDate field | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_12 | Regenerating MISP Partner License with missing LicenseKeyName field | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_19 | Regenerating MISP Partner License with missing RequestTime | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_04 | Regenerating MISP Partner License with Not Approved PolicyID | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_08 | Regenerating MISP Partner License with special character in LicenseKeyName | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_05 | Regenerating MISP Partner License with special character in PolicyID | 00:00:01 |
| DeactivateMISPPartnerLicense — Passed | ||
| TC_PMS_DeactivateMISPPartnerLicense_01 | Deactivating the MISP Partner License using a valid access token. | 00:00:01 |
| DeactivateMISPPartnerLicenseNegTC — Passed | ||
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_06 | Deactivating MISP Partner License with Empty PolicyId and LicenseKeyName | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_07 | Deactivating MISP Partner License with Empty PolicyId and Status | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_05 | Deactivating MISP Partner License with Empty PolicyId | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_10 | Deactivating MISP Partner License with invalid Id | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_04 | Deactivating MISP Partner License with invalid PolicyId | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_03 | Deactivating MISP Partner License with invalid Status | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_09 | Deactivating MISP Partner License with invalid Access Token | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_02 | Deactivating MISP Partner License with invalid Version | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_01 | Deactivating MISP Partner License with invalid Access Token | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_08 | Deactivating MISP Partner License without PartnerId Field | 00:00:01 |
| DeactivateDevice — Passed | ||
| TC_PMS_DeactivateDevice_01 | Deactivate Device | 00:00:01 |
| DeactivateDeviceNegativeScenarios — Passed | ||
| TC_PMS_DeactivateDevice_07 | Deactivate Device which has been already Deactivated | 00:00:01 |
| TC_PMS_DeactivateDevice_05 | Deactivate Device while keeping requestTime paramter as Empty | 00:00:01 |
| TC_PMS_DeactivateDevice_04 | Deactivate Device while keeping requestTime paramter as Missing | 00:00:01 |
| TC_PMS_DeactivateDevice_09 | Deactivate Device while keeping Version parameter as Empty | 00:00:01 |
| TC_PMS_DeactivateDevice_02 | Deactivate Device by passing invalid Device ID | 00:00:01 |
| TC_PMS_DeactivateDevice_06 | Deactivate Device by passwing invalid Random Device ID | 00:00:01 |
| TC_PMS_DeactivateDevice_08 | Deactivate Device by passing invalid Version | 00:00:01 |
| TC_PMS_DeactivateDevice_03 | Deactivate Device by passing invalid requestTime | 00:00:01 |
| TC_PMS_DeactivateDevice_01 | Deactivate Device without Partner authentication | 00:00:01 |
| DeactivateSBIWithAssociatedDevices — Passed | ||
| TC_PMS_DeactivateSBIWithAssociatedDevices_01 | Deactivate SBI along with Associated Devices | 00:00:01 |
| DeactivateSBIWithAssociatedDevicesNegativeScenarios — Passed | ||
| TC_PMS_DeactivateSBIWithAssociatedDevices_15 | Deactivate SBI which already Deactivated in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_07 | Deactivate SBI while keeping ID parameter as Empty in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_10 | Deactivate SBI while keeping Version parameter as Empty in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_03 | Deactivate SBI while keeping requestTime parameter as Empty in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_18 | Deactivate SBI while keeping SBI ID parameter as Invalid Numeric values in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_04 | Deactivate SBI by passing Invalid ID parameter in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_19 | Deactivate SBI while keeping SBI ID parameter as Invalid values in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_12 | Deactivate SBI while keeping Version parameter as invalid value 0 in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_11 | Deactivate SBI while keeping Version parameter as invalid value 1 in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_13 | Deactivate SBI while keeping Version parameter as invalid values in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_14 | Deactivate SBI while keeping Request Time parameter as invalid in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_06 | Deactivate SBI while keeping ID parameter as Null in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_05 | Deactivate SBI while keeping ID parameter as Missing in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_08 | Deactivate SBI without Version parameter in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_02 | Deactivate SBI while keeping requestTime parameter as Missing in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_16 | Deactivate SBI while keeping SBI ID parameter as Null in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_09 | Deactivate SBI while keeping Version parameter as Null in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_17 | Deactivate SBI while keeping SBI ID parameter as Empty in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_01 | Deactivate SBI with associated Devices without Partner authentication | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_20 | Deactivate SBI with invalid Partner roles | 00:00:01 |
| ApproveMappingDeviceToSbiwhenSBIisDeactivated — Passed | ||
| TC_PMS_ApproveMappingDevice_15 | Approve Mapping Device To Sbi when SBI is Deactivated | 00:00:01 |
| DeactivateFtm — Passed | ||
| TC_PMS_DeactivateFtm_01 | Deactivate Device with valid Partner authentication | 00:00:01 |
| DeactivateFtmNegativeScenarios — Passed | ||
| TC_PMS_DeactivateFtmNegativeScenarios_14 | Deactivating the FTM which is already Deactivated and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_16 | Deactivate the FTM while keeping FTM ID parameter as Empty and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_04 | Deactivate FTM keeping ID parameter as Empty in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_07 | Deactivate FTM while keeping Version parameter as Empty in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_12 | Deactivate FTM while keeping requestTime parameter as Empty in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_17 | Deactivate the FTM while keeping FTM ID parameter as Invalid values and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_09 | Deactivate FTM while keeping Version parameter as invalid value 0 in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_08 | Deactivate FTM while keeping Version parameter as invalid value 1 in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_10 | Deactivate FTM while keeping Version parameter as invalid values in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_13 | Deactivate FTM while keeping Request Time parameter as invalid in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_03 | Deactivate FTM while keeping requestID parameter as Null in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_02 | Deactivate FTM with the requestID parameter missing in the request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_05 | Deactivate FTM while keeping Version parameter as Missing in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_11 | Deactivate FTM while keeping requestTime parameter as Missing in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_18 | Deactivate the FTM while keeping FTM ID parameter as Null and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_06 | Deactivate FTM while keeping Version parameter as Null in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_15 | Deactivate the FTM while keeping FTM ID parameter as Missing and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_01 | Deactivate FTM without Partner authentication and expecting an error in the response | 00:00:01 |
| GetOriginalFtmCertifacteAfterDeactiveFtm — Passed | ||
| TC_PMS_GetOriginalFtmCertifacteAfterDeactiveFtm_01 | Get Original Ftm Certifacte After Deactivate Ftm | 00:00:01 |
| DeactivatePolicy — Passed | ||
| TC_PMS_deactivate_policy_01 | Deactivate policy | 00:00:01 |
| TC_PMS_deactivate_policy_11 | Deactivate policy with rejected policy | 00:00:01 |
| TC_PMS_deactivate_policy_06 | Deactivate policy which is already deactiavted | 00:00:01 |
| TC_PMS_deactivate_policy_04 | Deactivate policy with invalid policyid | 00:00:01 |
| TC_PMS_deactivate_policy_05 | Deactivate policy with only spaces as policyid | 00:00:01 |
| TC_PMS_deactivate_policy_03 | Deactivate policy authenticated with invalid roles | 00:00:01 |
| TC_PMS_deactivate_policy_12 | Deactivate policy with draft policy requests | 00:00:01 |
| TC_PMS_deactivate_policy_13 | Deactivate policy with draft policy requests | 00:00:01 |
| TC_PMS_deactivate_policy_10 | Deactivate policy with approved policy requests | 00:00:01 |
| TC_PMS_deactivate_policy_02 | Deactivate policy without authentication | 00:00:01 |
| TC_PMS_deactivate_policy_07 | Deactivate policy without id | 00:00:01 |
| TC_PMS_deactivate_policy_09 | Deactivate policy without requesttime | 00:00:01 |
| TC_PMS_deactivate_policy_08 | Deactivate policy without version | 00:00:01 |
| DeactivatePolicyGroup — Passed | ||
| TC_PMS_deactivate_policy_group_01 | Deactivate Policy Group | 00:00:01 |
| TC_PMS_deactivate_policy_group_12 | Deactivate Policy Group with future date given as requesttime | 00:00:01 |
| TC_PMS_deactivate_policy_group_05 | Deactivate Policy Group with invalid id value | 00:00:01 |
| TC_PMS_deactivate_policy_group_11 | Deactivate Policy Group invalid policygroupid | 00:00:01 |
| TC_PMS_deactivate_policy_group_03 | Deactivate Policy Group authenticated using invalid roles | 00:00:01 |
| TC_PMS_deactivate_policy_group_09 | Deactivate Policy Group with invalid status | 00:00:01 |
| TC_PMS_deactivate_policy_group_07 | Deactivate Policy Group invalid version | 00:00:01 |
| TC_PMS_deactivate_policy_group_13 | Deactivate Policy Group with past date given as requesttime | 00:00:01 |
| TC_PMS_deactivate_policy_group_10 | Deactivate Policy Group without policygroupid | 00:00:01 |
| TC_PMS_deactivate_policy_group_17 | Deactivate Policy Group with draft policy | 00:00:01 |
| TC_PMS_deactivate_policy_group_15 | Deactivate Policy Group with deactivated policies | 00:00:01 |
| TC_PMS_deactivate_policy_group_16 | Deactivate Policy Group with published policy | 00:00:01 |
| TC_PMS_deactivate_policy_group_02 | Deactivate Policy Group without authentication | 00:00:01 |
| TC_PMS_deactivate_policy_group_04 | Deactivate Policy Group without id value | 00:00:01 |
| TC_PMS_deactivate_policy_group_14 | Deactivate Policy Group without requesttime | 00:00:01 |
| TC_PMS_deactivate_policy_group_08 | Deactivate Policy Group without status | 00:00:01 |
| TC_PMS_deactivate_policy_group_06 | Deactivate Policy Group without version | 00:00:01 |
| GetAllNotifications — Passed | ||
| TC_PMS_GetAllNotifications_13 | Get All Notifications by using Partner Token and filtered by Notification Type Root | 00:00:01 |
| TC_PMS_GetAllNotifications_14 | Get All Notifications by filtering CertificateID without selecting NotificatioType filter | 00:00:01 |
| TC_PMS_GetAllNotifications_01 | Get All Notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_06 | Get All Notifications by filtering different format Created From Date | 00:00:01 |
| TC_PMS_GetAllNotifications_08 | Get All Notifications by filtering different format Created To Date | 00:00:01 |
| TC_PMS_GetAllNotifications_10 | Get All Notifications by filtering different format Expiry Date | 00:00:01 |
| TC_PMS_GetAllNotifications_38 | Fetch all Notifications by selecting Api key name label and selecting NotificationType as ftmChip | 00:00:01 |
| TC_PMS_GetAllNotifications_41 | Fetch all Notifications by selecting sbi Id and selecting NotificationType as ftmChip | 00:00:01 |
| TC_PMS_GetAllNotifications_35 | Fetch all notifications invalid PageNo | 00:00:01 |
| TC_PMS_GetAllNotifications_02 | Get All Notifications by filtering page size 4 | 00:00:01 |
| TC_PMS_GetAllNotifications_03 | Get All Notifications by filtering page size 4 | 00:00:01 |
| TC_PMS_GetAllNotifications_18 | Get All Notifications by filtering only Root certificate notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_32 | Fetch all ftmChip without selecting notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_19 | Get All Notifications by filtering only Active certificate notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_20 | Get All Notifications by filtering only Dismissed certificate notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_17 | Get All Notifications by filtering only Weekly summary notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_39 | Fetch all Notifications by selecting ftmChip Id and selecting NotificationType as sbi | 00:00:01 |
| TC_PMS_GetAllNotifications_30 | Fetch all ftmChip without selecting notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_36 | Fetch all Notifications with invalid pageNo | 00:00:01 |
| TC_PMS_GetAllNotifications_37 | Fetch all Notifications with invalid pageNo | 00:00:01 |
| TC_PMS_GetAllNotifications_31 | Fetch all SBI Chip with invalid data | 00:00:01 |
| TC_PMS_GetAllNotifications_34 | Fetch all SBI Chip with invalid SBI Version data | 00:00:01 |
| TC_PMS_GetAllNotifications_33 | Fetch all SBI Chip with invalid SBI Version data | 00:00:01 |
| TC_PMS_GetAllNotifications_28 | Fetch all FTM Chip with invalid data | 00:00:01 |
| TC_PMS_GetAllNotifications_29 | Fetch all ftmChip with make & model data | 00:00:01 |
| TC_PMS_GetAllNotifications_27 | Fetch all policyName with invalid data | 00:00:01 |
| TC_PMS_GetAllNotifications_26 | Fetch all policyName by selecting invalid notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_25 | Fetch all policyName without selecting notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_40 | Fetch all Notifications by selecting sbi Id and selecting NotificationType as ftmChip | 00:00:01 |
| TC_PMS_GetAllNotifications_23 | Get All Notifications by filtering only IntermediateType certificate notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_21 | Get All Notifications by filtering only RootType certificate notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_04 | Get All Notifications by filtering invalid certificate ID | 00:00:01 |
| TC_PMS_GetAllNotifications_05 | Get All Notifications by filtering invalid Created From Date | 00:00:01 |
| TC_PMS_GetAllNotifications_07 | Get All Notifications by filtering invalid Created To Date | 00:00:01 |
| TC_PMS_GetAllNotifications_09 | Get All Notifications by filtering invalid Expiry Date | 00:00:01 |
| TC_PMS_GetAllNotifications_11 | Get All Notifications by filtering IssuedBy without selecting NotificatioType filter | 00:00:01 |
| TC_PMS_GetAllNotifications_12 | Get All Notifications by filtering IssuedTo without selecting NotificatioType filter | 00:00:01 |
| TC_PMS_GetAllNotifications_24 | Fetch all API key expiry notifications that with invalid API key name | 00:00:01 |
| TC_PMS_GetAllNotifications_15 | Get All Notifications without Authorization Token | 00:00:01 |
| TC_PMS_GetAllNotifications_16 | Get All Notifications without partner admin role | 00:00:01 |
| DismissNotificationNegativeScenarios — Passed | ||
| TC_PMS_DismissNotificationNegativeScenarios_18 | Dismiss Notification with Empty Notification Status | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_07 | Dismiss Notification with Empty Request ID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_14 | Dismiss Notification with Empty Request Time param | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_02 | Dismiss Notification with Invalid NotificationID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_17 | Dismiss Notification with invalid Notification status | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_19 | Dismiss Notification with invalid Notification Status parameter as DISMISS | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_04 | Dismiss Notification with invalid Request ID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_12 | Dismiss Notification with Version value 0 parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_11 | Dismiss Notification with Version value 1 parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_10 | Dismiss Notification with Version parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_03 | Dismiss Notification with Null NotificationID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_06 | Dismiss Notification with Null Request ID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_09 | Dismiss Notification with Version parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_01 | Dismiss Notification without Authentication | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_05 | Dismiss Notification without Request ID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_08 | Dismiss Notification with Version parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_16 | Dismiss Notification without object Parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_15 | Dismiss Notification without Partner Admin role | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_13 | Dismiss Notification without RequestTime parameter | 00:00:01 |
| UpdateNotificationSeenTimestamp — Passed | ||
| TC_PMS_UpdateNotificationSeenTimestamp_01 | Update Notification Seen Timestamp with valid details | 00:00:01 |
| UpdateNotificationSeenTimestampNegativeScenarios — Passed | ||
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_07 | Update Notification Seen Timestamp Empty RequestId param | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_14 | Update Notification Seen Timestamp Empty RequestTime | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_16 | Update Notification Seen Timestamp Empty notificationsSeenDtimes parameter | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_17 | Update Notification Seen Timestamp with Invalid partner admin role | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_04 | Update Notification Seen Timestamp with Invalid RequestId param | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_10 | Update Notification Seen Timestamp Invalid Version value | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_02 | Update Notification Seen Timestamp with invalid userID | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_06 | Update Notification Seen Timestamp Null RequestId param | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_09 | Update Notification Seen Timestamp Null Version value | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_03 | Update Notification Seen Timestamp with Null userID | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_12 | Update Notification Seen Timestamp Version value0 | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_11 | Update Notification Seen Timestamp Version value1 | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_01 | Update Notification Seen Timestamp without Authentication | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_08 | Update Notification Seen Timestamp without Version value | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_18 | Update Notification Seen Timestamp with Invalid partner admin role | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_15 | Update Notification Seen Timestamp without Object parameter | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_05 | Update Notification Seen Timestamp without RequestId param | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_13 | Update Notification Seen Timestamp without RequestTime | 00:00:01 |
| GetNotificationsSeenTimestamp — Passed | ||
| TC_PMS_GetNotificationsSeenTimestamp_01 | Get Notifications Seen Timestamp | 00:00:01 |
| GetNotificationsSeenTimestampNegativeScenarios — Passed | ||
| TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_01 | Get Notifications Seen Timestamp with invalid userId | 00:00:01 |
| TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_03 | Get Notifications Seen Timestamp with invalid token | 00:00:01 |
| TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_02 | Get Notifications Seen Timestamp without Adminrole | 00:00:01 |
| GetPartnerExpiringCertificate — Passed | ||
| TC_PMS_GetPartnerExpiringCertificate_01 | Get Partner Expiring Certificates | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificate_04 | Get Partner Expiring Certificate with Expiry date 10 days | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificate_03 | Get Partner Expiring Certificate with Expiry date 15 days | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificate_02 | Get Partner Expiring Certificate with Expiry date 30 days | 00:00:01 |
| GetPartnerExpiringCertificateNegativeScenarios — Passed | ||
| TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_02 | Get Partner Expiring Certificates with invalid Role | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_01 | Get Partner Expiring Certificates with invalid token | 00:00:01 |
| GetRootIntermediateExpiringCertificate — Passed | ||
| TC_PMS_GetRootIntermediateExpiringCertificate_01 | Get Root and Intermediate Expiring Certificates | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificate_04 | Get Root and Intermediate Expiring Certificates | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificate_03 | Get Root and Intermediate Expiring Certificates | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificate_02 | Get Root and Intermediate Expiring Certificates | 00:00:01 |
| GetRootIntermediateExpiringCertificateNegativeScenarios — Passed | ||
| TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_01 | Get Root Intermediate Expiring Certificates with invalid token | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_02 | Get Root Intermediate Expiring Certificates with Partner Role | 00:00:01 |
| GetAllApiKeyForAuthPartnerV2 — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerV2_01 | Fetching all the API Key created by Authentication Partner by Partner Admin token | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_02 | Fetching all the API Key created by Authentication Partner | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_05 | Fetching all the API Key created by Authentication Partner Filter by pageNo | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_16 | Fetching all the API Key created by Authentication Partner Filter by Expiry period 10 days | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_15 | Fetching all the API Key created by Authentication Partner Filter by Expiry period 15 days | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_14 | Fetching all the API Key created by Authentication Partner Filter by Expiry period 30 days | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_12 | Fetching all the API Key created by Authentication Partner Filter by Status Activated | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_13 | Fetching all the API Key created by Authentication Partner Filter by Status Deactivated | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_03 | Fetching all the API Key created by Authentication Partner Filter by apiKeyLabel | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_04 | Fetching all the API Key created by Authentication Partner Filter by orgName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_06 | Fetching all the API Key created by Authentication Partner Filter by pageSize | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_07 | Fetching all the API Key created by Authentication Partner Filter by partnerId | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_08 | Fetching all the API Key created by Authentication Partner Filter by policyGroupName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_09 | Fetching all the API Key created by Authentication Partner Filter by policyName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_10 | Fetching all the API Key created by Authentication Partner Filter by sortFieldName and sortType Ascending | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_11 | Fetching all the API Key created by Authentication Partner Filter by sortFieldName and sortType Descending | 00:00:01 |
| GetAllApiKeyForAuthPartnerV2NegativeScenarios — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_02 | Fetching all the API Key created by Authentication Partner Filter by Device Partner token | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_03 | Fetching all the API Key created by Authentication Partner Filter by FTM Partner token | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_14 | Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_13 | Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_04 | Fetching all the API Key created by Authentication Partner Filter by Invalid apiKeyLabel | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_05 | Fetching all the API Key created by Authentication Partner Filter by Invalid orgName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_06 | Fetching all the API Key created by Authentication Partner Filter by Invalid pageNo | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_07 | Fetching all the API Key created by Authentication Partner Filter by Invalid pageSize | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_08 | Fetching all the API Key created by Authentication Partner Filter by Invalid partnerId | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_09 | Fetching all the API Key created by Authentication Partner Filter by Invalid policyGroupName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_10 | Fetching all the API Key created by Authentication Partner Filter by Invalid policyName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_12 | Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_11 | Fetching all the API Key created by Authentication Partner Filter by sortFieldName and without selecting pageno & pageSize | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_01 | Fetching all the API Key created by Authentication Partner without Authentication for Partner Admin | 00:00:01 |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Active_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group2", "name": "mosip policy group2", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip draft policy group19234", "name": "mosip draft policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for draft policy, uniqueIdentifier=TC_PMS_definePolicyGroup_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc published mosip policy group19234", "name": "mosip published policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for published policy, uniqueIdentifier=TC_PMS_definePolicyGroup_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip delete before policy creation policy group19234", "name": "mosip delete before policy creation policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for draft policy, uniqueIdentifier=TC_PMS_definePolicyGroup_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc deactivate mosip policy group19234", "name": "mosip deactivate policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for deactivate policy, uniqueIdentifier=TC_PMS_definePolicyGroup_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_For_Test_AuthTypeToken_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy group for AuthTypeToken", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_For_updatePolicy_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group for req key For Update", "name": "mosip policy group for req key For Update", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group19234", "name": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_AlreadyExists_InValid_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group19234", "name": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_014", "message": "Policy group exists with name : mosip policy group 19234" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy neg", "name": "mosip policy group neg", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "mosip policy group MISP", "name": "mosip policy group MISP", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for MISP PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_desc_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.desc" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy Group, uniqueIdentifier=TC_PMS_definePolicyGroup_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_name_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group", "name": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy Group, uniqueIdentifier=TC_PMS_definePolicyGroup_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_requesttime_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group 1233", "name": "mosip policy group 1233", "requesttime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004", "message": "Invalid request time" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a policy group with missing request time, uniqueIdentifier=TC_PMS_definePolicyGroup_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_PastDate_Request_Time_Neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group192345", "name": "mosip policy group 192345", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006", "message": "Request date should be current date" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup with invalid request time, uniqueIdentifier=TC_PMS_definePolicyGroup_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_UpdatePolicyGroupForPartner_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc update policy group", "name": "update_policy_group", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Without_Auth_neg, endPoint=/v1/policymanager/policies/group/new, role=temp, templateFields=null, input={ "desc": "desc mosip policy group192345", "name": "mosip policy group 192345", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-403", "message": "Forbidden" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a policy group, uniqueIdentifier=TC_PMS_definePolicyGroup_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group1923456789", "name": "mosip policy group1923456789", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_create_then_deactivateAll_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group1923456", "name": "mosip policy group1923456", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_for_Get_ApiKey_With_Deactive_Partner_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "name": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyGroup_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$" }, output={ "desc": "desc mosip policy group19234", "isActive": true, "name": "mosip policy group 19234" }, inputTemplate=pms/policy/GetPolicyGroup/getPolicyGroup, outputTemplate=pms/policy/GetPolicyGroup/getPolicyGroupResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Parter Policy Group, uniqueIdentifier=TC_PMS_getPolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyGroup_By_Invalid_policyGroupId, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "policyGroupId": "policygroup-id-00001" }, output={ "errors": [ { "errorCode": "PMS_POL_016" } ] }, inputTemplate=pms/policy/GetPolicyGroup/getPolicyGroup, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Parter Policy Group with invalid PolicyGroupId, uniqueIdentifier=TC_PMS_getPolicyGroup_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_All_Valid, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": false, "desc": "desc mosip policy group20", "name": "mosip policy group20", "policyGroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output= { "name": "mosip policy group20", "desc": "desc mosip policy group20", "is_Active": false }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroupResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group with valid details, uniqueIdentifier=TC_PMS_updatePolicyGroup_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_Invalid_InputParameter_policyGroupId, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "desc mosip policy group", "name": "mosip policy group", "policyGroupId": "1234abcxyz", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group while keeping PolicyGroupID parameter as invalid, uniqueIdentifier=TC_PMS_updatePolicyGroup_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_Missing_InputParameter_desc, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "$REMOVE$", "name": "mosip policy group neg4", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.desc" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group while keeping PolicyGroupID parameter as missing and filter data in descending order, uniqueIdentifier=TC_PMS_updatePolicyGroup_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_Missing_InputParameter_isActive, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": "$REMOVE$", "desc": "desc mosip policy group neg4", "name": "mosip policy group neg4", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group while keeping isActive parameter as missing, uniqueIdentifier=TC_PMS_updatePolicyGroup_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_Missing_InputParameter_name, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "desc mosip policy group", "name": "$REMOVE$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group while keeping Name parameter as missing, uniqueIdentifier=TC_PMS_updatePolicyGroup_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_activate_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "desc mosip policy group updated", "name": "mosip policy group", "policyGroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output= { "name": "mosip policy group", "desc": "desc mosip policy group updated", "is_Active": true }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroupResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group as Activate with valid details, uniqueIdentifier=TC_PMS_updatePolicyGroup_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_deactivate_All_Valid, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": false, "desc": "desc mosip policy group deactivate", "name": "mosip policy group deactivate", "policyGroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output= { "name": "mosip policy group deactivate", "desc": "desc mosip policy group deactivate", "is_Active": false }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroupResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group as Deactivate with valid details, uniqueIdentifier=TC_PMS_updatePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroupBeforePolicyCreation_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$" }, output= { "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroupBeforePolicyCreation/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroupBeforePolicyCreation/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group before policy is created, uniqueIdentifier=TC_PMS_DeactivatePolicyGroupBeforePolicyCreation_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Draft_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc draft mosip policy 19234", "name": "mosip draft policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip draft policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip draft policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_InProgressMapping_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc in progress mapping mosip policy 19234", "name": "mosip in progress mapping policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Published_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc published mosip policy 19234", "name": "mosip published policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip published policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip published policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Reject_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc reject mosip policy 19234", "name": "mosip reject policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Blank, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy for invalid AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Invalid_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "kjh54", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy For invalid AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Null_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "null", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy for auth token type null, uniqueIdentifier=TC_PMS_definePolicy_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Policy, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "Policy", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy for authtoken type policy, uniqueIdentifier=TC_PMS_definePolicy_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Space, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": " ", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy for AuthTypeToken space, uniqueIdentifier=TC_PMS_definePolicy_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc deactive mosip policy 19234", "name": "mosip deactive policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip deactivate policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip deactivate policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group 19234", "name": "mosip policy", "desc": "desc mosip policy", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/policy/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get API key for deactivated SID, uniqueIdentifier=TC_PMS_definePolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy 19234", "name": "mosip policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_DemoAuth_With_Same_Policy_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy 19234", "authSubType": "FINGER", "authType": "demo", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_009", "message": "$IGNORE$" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy with same policyname, uniqueIdentifier=TC_PMS_definePolicy_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_authTokenType_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg2", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$REMOVE$", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy without authtoken type, uniqueIdentifier=TC_PMS_definePolicy_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_authType_neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg", "authSubType": "FINGER", "authType": "$REMOVE$", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without authtype, uniqueIdentifier=TC_PMS_definePolicy_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_descNeg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy withput input parameter, uniqueIdentifier=TC_PMS_definePolicy_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_mandatory_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg 1", "authSubType": "FINGER", "authType": "bio", "mandatory": $REMOVE$, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "allowedKycAttributes": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy, uniqueIdentifier=TC_PMS_definePolicy_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_name_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "$REMOVE$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy missing input parameter, uniqueIdentifier=TC_PMS_definePolicy_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_policyGroupName, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$REMOVE$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy without policygroupname, uniqueIdentifier=TC_PMS_definePolicy_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_policyType, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "$REMOVE$", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without policy type, uniqueIdentifier=TC_PMS_definePolicy_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_PolicyGrpInActive_InValid_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy 192345", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip delete before policy creation policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_053" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy for Inactive policy group, uniqueIdentifier=TC_PMS_definePolicy_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_PolicyGrpNotExists_InValid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "asbgdfg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_019" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy for non existing policygroup, uniqueIdentifier=TC_PMS_definePolicy_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_RandomTokenType_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy2", "name": "mosip policy2 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": false, "attributeName": "string", "authTokenType": "random", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip policy2", "desc": "desc mosip policy2", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/policy/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy for random AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Remove_Demo_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy5", "name": "mosip policy5 Neg", "authSubType": "FINGER", "authType": "$REMOVE$", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy without demo, uniqueIdentifier=TC_PMS_definePolicy_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_demo_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "demo", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group neg", "name": "mosip policy9 Neg", "desc": "desc mosip policy9", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy, uniqueIdentifier=TC_PMS_definePolicy_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_when_authTokenType_invalid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "162g@fsgs", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid authtokentype, uniqueIdentifier=TC_PMS_definePolicy_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_when_authTokenType_missing, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$REMOVE$", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without authtoken type, uniqueIdentifier=TC_PMS_definePolicy_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_when_authTokenType_null, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without authtoken type, uniqueIdentifier=TC_PMS_definePolicy_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_without_AuthTypeToken, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$IGNORE$", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=DefinePolicy without AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineMISPPolicy_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "policyGroupName": "mosip policy group MISP", "policyType": "MISP", "name": "mosip policy MISP API Policy 12345", "desc": "desc mosip policy MISP API Policy 12345", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "mosip policy group MISP", "is_Active": false }, inputTemplate=pms/DefinePolicy/DefineMISPPolicy, outputTemplate=pms/DefinePolicy/DefineMISPPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_DefineMISPPolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policy", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy with valid details, uniqueIdentifier=TC_PMS_defineDataSharePolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_All_for_Update_smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group for req key For Update", "name": "mosip policy group for req key For Update", "policyId": "MDSPFU", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policy", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy for update partner, uniqueIdentifier=TC_PMS_defineDataSharePolicy_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_All_for_req_ApiKey_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy ApiKey", "name": "mosip data share policy ApiKey", "policyId": "MDSPFA", "policyGroupName": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "name": "mosip data share policy", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy for requested API Key, uniqueIdentifier=TC_PMS_defineDataSharePolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_AttributeName_Custom_Name_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyk", "policyId": "MDSPm", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"custom name", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policyk", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping AttributeName parameter as custome name value, uniqueIdentifier=TC_PMS_defineDataSharePolicy_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_Cancelling_the_create_dataSharePolicy, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy name", "policyId": "MDSP239fhfdndn", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policy name", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while Cancelling the created dataSharePolicy, uniqueIdentifier=TC_PMS_defineDataSharePolicy_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_EncryptionType_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyh", "policyId": "MDSPHH", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "none", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policyh", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping EncryptionType parameter as none value, uniqueIdentifier=TC_PMS_defineDataSharePolicy_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_InActive_policyGroup, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip delete before policy creation policy group 19234", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_053" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy for inactive Policy Group, uniqueIdentifier=TC_PMS_defineDataSharePolicy_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_IndividualBiometrics_Attribute, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyb", "policyId": "MDSPB", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"individualBiometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policyb", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping attributeName parameter as IndividualBiometrics, uniqueIdentifier=TC_PMS_defineDataSharePolicy_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_RemovedAttribute_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy7", "name": "mosip data share policy7", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"$REMOVE$", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping AttributeName parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_ToCheckStatus_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy check status", "name": "mosip data share policy to check status22", "policyId": "MDSP8", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policy to check status22", "desc": "mosip policy group", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy To check status, uniqueIdentifier=TC_PMS_defineDataSharePolicy_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_WithoutMandatoryFields_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy2", "name": "mosip data share policy2", "policyId": "MDSP2", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"$REMOVE$", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policy2", "desc": "mosip data share policy2", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy Without Mandatory Fields, uniqueIdentifier=TC_PMS_defineDataSharePolicy_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_Zipcode_Attribute, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyd", "policyId": "MDSPC", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"Zipcode", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policyd", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping attributeName parameter as Zipcode, uniqueIdentifier=TC_PMS_defineDataSharePolicy_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_duplicate_policy_name, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_009" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy with duplicate Policy name, uniqueIdentifier=TC_PMS_defineDataSharePolicy_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_format_SpaceVal_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policya", "policyId": "MDSPA", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":" ", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policya", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping Format parameter with spaces value, uniqueIdentifier=TC_PMS_defineDataSharePolicy_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_invalid_policy_grp_name, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "abcd", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_019" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping invalid Policy Group name, uniqueIdentifier=TC_PMS_defineDataSharePolicy_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_invalid_policy_type, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "abcd", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_023" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping invalid Policy Type, uniqueIdentifier=TC_PMS_defineDataSharePolicy_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_missing_PolicyGrpName, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "$REMOVE$", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping Policy Group Name parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_missing_PolicyType, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "$REMOVE$", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping Policy Type parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_missing_descr, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping description parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_missing_name, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "$REMOVE$", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping name parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_shareDomain_https_Smoke, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyg", "policyId": "MDSPGG", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "https", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policyg", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping shareDomain parameter as https, uniqueIdentifier=TC_PMS_defineDataSharePolicy_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_typeOfShare_Direct_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyf", "policyId": "MDSPEE", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Direct", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping typeOfShare parameter as Direct value, uniqueIdentifier=TC_PMS_defineDataSharePolicy_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_typeOfShare_Remove_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyi", "policyId": "MDSPEE", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "$REMOVE$", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping typeOfShare parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_typeOfShare_SpaceVal_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policye", "policyId": "MDSPDD", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": " ", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping typeofShare parameter with spaces value, uniqueIdentifier=TC_PMS_defineDataSharePolicy_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_without_policyId, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy without policy id", "policyId": "$REMOVE$", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy without PolicyId, uniqueIdentifier=TC_PMS_defineDataSharePolicy_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Invalid_InputParameter_policyID, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "1234abcxz", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy while keeping InputParameter as invalid for PolicyID, uniqueIdentifier=TC_PMS_createUpdatePolicy_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Invalid_PolicyID, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "asfgref", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy with invalid PolicyID, uniqueIdentifier=TC_PMS_createUpdatePolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Invalid_PolicygroupName, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "asfgrrw", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_019", "message": "Policy group name does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy with invalid PolicyGroupName, uniqueIdentifier=TC_PMS_createUpdatePolicy_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_authTokenType_neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy missing neg", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$REMOVE$", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006", "message": "Missing input parameter - authTokenType" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy while keeping authTokeType Parameter as Empty, uniqueIdentifier=TC_PMS_createUpdatePolicy_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_desc, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip policy", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.desc" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy while keeping InputParameter as empty, uniqueIdentifier=TC_PMS_createUpdatePolicy_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_name, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "$REMOVE$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy with invalid PolicyParameterName, uniqueIdentifier=TC_PMS_createUpdatePolicy_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_policyGroupName_neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$REMOVE$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.policyGroupName" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy while keeping PolicyGroupName Parameter as Empty, uniqueIdentifier=TC_PMS_createUpdatePolicy_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_Active_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"active", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_054", "message": "Cannot activate unpublished policy." } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status as Active with invalid data, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_DeActive_auth_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"De-Active", "requesttime": "$TIMESTAMP$" }, output= { "message": "status updated successfully" }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatusResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status as DeActive, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_DeActive_datashare_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "MDSP", "policygroupId":"$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "status":"De-Active", "requesttime": "$TIMESTAMP$" }, output= { "message": "status updated successfully" }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatusResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status as DeActive for datashare, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_Missing_status_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status while keeping status parameter as empty, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_PolicyGroupId_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"asfbvef", "status":"Active", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_016", "message": "Policy Group ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status while keeping PolicyGroupId parameter as invalid, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_PolicyId_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "asfgv", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"Active", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status as Active with invalid PolicyID, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_status_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"asfg", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_045", "message": "Policy Status either Active or De-active." } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status while keeping status parameter as invalid, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PublishDataSharePolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "policyId": "MDSP", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "DataShare", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_ForInProgressPolicyMapping, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_For_InProgressMapping_Policy_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy for rejecting partner policy mapping request, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_ForRejectPolicyMapping, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_For_Reject_Policy_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy for rejecting partner policy mapping request, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_Smoke_ForNeg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_forDeactivatePolicyGroup_ForNeg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_For_Published_Policy_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy for deactivate policy group with published policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_ForDeactive_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_InValid_AlreadyPublished_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_020" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy which is already published, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_InValid_policyId_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "afgrwfg", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy with invalid policyid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_InValid_policygroupId_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "sgdasfgbv", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_016" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy with invalid policygroupid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_MISPPolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "mosip policy group MISP", "is_Active": true }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyMISPResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish MISP Policy created by PartnerAdmin, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_invalid_auth_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=invalidtoken, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy without access token, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllActivePolicyGroups_All_Valid_Smoke, endPoint=/v1/policymanager/policies/policy-groups, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroupsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active PolicyGroups, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllActivePolicyGroups_Invalid_auth, endPoint=/v1/policymanager/policies/policy-groups, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active PolicyGroups with invalid token, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllActivePolicyGroups_without_auth, endPoint=/v1/policymanager/policies/policy-groups, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active PolicyGroups without token, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/{policyId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output= { "policyGroupName": "mosip policy group 19234", "policyGroupDesc": "desc mosip policy group19234", "policyGroupStatus": true, "policyName": "mosip policy 19234", "policyDesc": "desc mosip policy 19234", "authTokenType": "partner" }, inputTemplate=pms/policy/GetPolicy/getPolicy, outputTemplate=pms/policy/GetPolicy/getPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Parter Policy, uniqueIdentifier=TC_PMS_getPolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicy_Invalid_InputParameter_policyId, endPoint=/v1/policymanager/policies/{policyId}, role=partner, templateFields=null, input={ "policyId": "policy123456" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/GetPolicy/getPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Parter Policy with invalid PolicyId, uniqueIdentifier=TC_PMS_getPolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_AllValid_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "policyType": "DataShare", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy with valid details, uniqueIdentifier=TC_PMS_createSearchPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_Only_FilterCriteria_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Data Share2" } ], "policyType": "DataShare", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_Only_PaginationCriteria_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "policyType": "DataShare", "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchPartner_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_Only_SortaCriteria_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchPartner_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_Valid_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "policyType": "DataShare", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy with valid details, uniqueIdentifier=TC_PMS_createSearchPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_contains_Smoke_asc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "data share" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "version": "1.0", "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPartner_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_contains_Smoke_desc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "data share" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "version": "1.0", "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as contains and filter the data in descending order, uniqueIdentifier=TC_PMS_createSearchPartner_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_equals_Smoke_asc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "mosip data share policy" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as Equals and filter the data in ascending order, uniqueIdentifier=TC_PMS_createSearchPartner_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_equals_Smoke_desc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "mosip data share policy" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as Equals and filter the data in descending order, uniqueIdentifier=TC_PMS_createSearchPartner_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_startswith_Smoke_asc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as Startswith and filter the data in ascending order, uniqueIdentifier=TC_PMS_createSearchPartner_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_startswith_Smoke_desc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "version": "1.0", "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as Startswith and filter the data in descending order, uniqueIdentifier=TC_PMS_createSearchPartner_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_columnName, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "n@@@@@343e", "type": "startswith", "value": "Data Share2" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping columnName parameter, uniqueIdentifier=TC_PMS_createSearchPartner_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_sort_field, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "n@@@@3334$$$e", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping sortField parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartner_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_sort_type, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Data Share2" } ], "sort": [ { "sortField": "name", "sortType": "dc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping sortType parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartner_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_value_contains, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": ")()()****$$$$$$$$$$)))" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping value parameter as invalid and filter the data in descending order, uniqueIdentifier=TC_PMS_createSearchPartner_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_value_equals, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "Da@@3344" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping value parameter as invalid and Type parameter as Equals, uniqueIdentifier=TC_PMS_createSearchPartner_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_value_startswith, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Da@@3344" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping value parameter as invalid and Type parameter as startswith, uniqueIdentifier=TC_PMS_createSearchPartner_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_missing_columnName, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS_COR_003" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping columnName parameter as Empty, uniqueIdentifier=TC_PMS_createSearchPartner_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_missing_sort_field, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Data Share2" } ], "sort": [ { "sortField": "$REMOVE$", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping sortField parameter as Empty, uniqueIdentifier=TC_PMS_createSearchPartner_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_missing_sort_type, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "$REMOVE$" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping sortType parameter as Empty, uniqueIdentifier=TC_PMS_createSearchPartner_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_missing_type, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "$REMOVE$", "value": "Data Share2" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as Empty, uniqueIdentifier=TC_PMS_createSearchPartner_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_PrintPartner_AllValid_Smoke, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "mosipprint@gmail.com", "organizationName": "mosipprint", "partnerId": "mosipprint", "partnerType": "Print_Partner", "policyGroup":"mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "mosipprint", "status": "InProgress" }, inputTemplate=pms/PrintPartner/CreatePartner/createPartner, outputTemplate=pms/PrintPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Print Partner Self Registration with valid details, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_PrintPartner_DublicateEmail_Neg, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "mosipprint@gmail.com", "organizationName": "mosipprint", "partnerId": "mosipprint", "partnerType": "Print_Partner", "policyGroup":"mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/PrintPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Print Partner Self Registration with duplicate Email, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_PrintPartner_SpaceIn_PartnerId_Neg, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "mosipprsint@gmail.com", "organizationName": "mosipprint", "partnerId": "mosip print", "partnerType": "Print_Partner", "policyGroup":"mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_066" } ] }, inputTemplate=pms/PrintPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Print Partner Self Registration while keeping SpaceIn PartnerId, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=pms/PrintPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/PrintPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA Certificate for Print Partner, uniqueIdentifier=TC_PMS_uploadCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/PrintPartner/UploadCert/uploadCert, outputTemplate=pms/PrintPartner/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Print Partner Certificate, uniqueIdentifier=TC_PMS_UploadPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePrintPartner_AllValid_smoke, endPoint=/v1/partnermanager/partners/v2/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "mosipprint", "address": "Benglore", "contactNumber": "9876453210", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "mosipprint", "status": "approved" }, inputTemplate=pms/PrintPartner/UpdatePrintPartner/UpdatePrintPartner, outputTemplate=pms/PrintPartner/UpdatePrintPartner/UpdatePrintPartnerResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Print Partner with valid details, uniqueIdentifier=TC_PMS_UpdatePrintPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerDetails_allValid_smoke, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "partnerType":"Print_Partner" }, output={ }, inputTemplate=pms/PrintPartner/GetPartnerDetails/GetPartnerDetails, outputTemplate=pms/PrintPartner/GetPartnerDetails/GetPartnerDetailsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Print Partner Details, uniqueIdentifier=TC_PMS_GetPartnerDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_withoutPartnerRegister_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Without Partner Register, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerWithoutPartnerRegister_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_BeforePartnerCreate_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_All_for_Get_ApiKey_With_Deactive_Partner_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosipsfgh@gmail.com", "organizationName": "Techno", "partnerId": "Tech-1233", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "Tech-1233", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with Deactivated Partner ID, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_AlreadyExisting_Policy_Name, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosippp@gmail.com", "organizationName": "Techno", "partnerId": "pms-111999", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_051" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with Already Existing Policy Name, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_AlreadyExists_invalid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip2@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111999", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_051" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with Already Existing Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Deactive_Partner_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosipgh@gmail.com", "organizationName": "Techno", "partnerId": "Tech-321", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "Tech-321", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with Deactivated Partner ID, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_InActive_policyGroup, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mmo@gmail.com", "organizationName": "Techno", "partnerId": "Tech-3241", "partnerType": "Auth_Partner", "policyGroup": "mosip delete before policy creation policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PMP_023" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with Policy Group, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_PartnerId, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "$REMOVE$", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion while keeping the PartnerID parameter as missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_address, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "$REMOVE$", "contactNumber": "8553967572", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion while keeping the address parameter as missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_contactNumber, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "$REMOVE$", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion while keeping the Contact Number parameter as missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_emailId, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$REMOVE$", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion while keeping the emailID parameter as missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_partnerType, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "$REMOVE$", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion while keeping the PartnerType parameter as missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_SpaceVAl_PartnerId_Neg, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "moosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech -123", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_066" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with invalid PartnerID, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_UpdatePolicyGroupForPartner_AllValid_Smoke, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "update@gmail.com", "organizationName": "Test", "partnerId": "updatepolicy", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "updatepolicy", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion and update Policy Group for Partner with valid data, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistrationFor_PartnerAdmin_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partneradmin, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763admin@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111777", "partnerType": "FTM_Provider", "policyGroup": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111777", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111999", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111999", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Device_provider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partnerdevice, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98768@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111998", "partnerType": "Device_Provider", "policyGroup": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111998", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partnerftm, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98788@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111888", "partnerType": "FTM_Provider", "policyGroup": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111888", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Missing_Email_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "organizationName": "PMS_API_ABC_ORG", "partnerId": "1119911", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Missing_Request_Time_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763125@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "1119910", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner with missing request time, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_PastDate_Request_Time_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763123@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "11199911", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner with invalid request time, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_reuse_same_Email_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111999", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "organizationName": "PMS_API_MISP_ORG", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartnerapiauto@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group MISP", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "pms-111555", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Empty_PolicyGroup, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111556", "organizationName": "PMS_API_MISP_ORG", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner1@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "pms-111556", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration Empty Policy group, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Max_AddressField, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111558", "organizationName": "PMS_API_MISP_ORG", "address": "The Modular Open Source Identity Platform was established in 2018 to support governments in providing its residents with an official form of the most important human asset identity.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education. As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial fiestaaa", "contactNumber": "8553967572", "emailId": "newmisppartner3@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "pms-111558", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with maximum 2000 words in Address field, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Max_Contact_number, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111559", "organizationName": "PMS_API_MISP_ORG", "address": "Bangalore", "contactNumber": "8553967572918818", "emailId": "newmisppartner4@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "pms-111559", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with maximum 16 numbers in contactNumber field, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Max_EmailID, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111550", "organizationName": "PMS_API_MISP_ORG", "address": "Bangalore", "contactNumber": "8553967572918818", "emailId": "this.is.a.really.long.fake.email.address.created.only.for.testing.purposespurposespurposespurposespurpos.and.demonstration.so.please.do.not.try.to.use.it.in.real.life.situations.because.it.is.not.valid@verylongdomainexampleforvalidationtestingpurpos1.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "pms-111550", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with maximum 254 email id, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Without_PolicyGroup_Smoke, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "organizationName": "PMS_API_MISP_ORG", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner2@gmail.com", "partnerType": "MISP_Partner", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "pms-111557", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration without Policy group, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_valid_langcode_Arabic, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111551", "organizationName": "PMS_API_MISP_ORG", "address": "Bangalore", "contactNumber": "8553967571", "emailId": "newmisppartner5@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "ara" }, output= { "partnerId": "pms-111551", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with lang code arabic, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_-1_EmailID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "-1", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with less than expected values in EmailID field, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_2000+_Words_Address_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "The Modular Open Source Identity Platform was established in 2018 to support governments in providing its residents with an official form of the most important human asset identity.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education. As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial fiestaaaTheMOSIPMOSIP", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with more than maximum 2000 words in Address field, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Empty_Address_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Missing Address, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Empty_ContactNumber_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Empty ContactNumber, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Empty_Email_Address_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$REMOVE$", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Empty Email Address, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Empty_OrganizationName_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": " ", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Empty OrganizationName, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Empty_PartnerID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Empty Partner ID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Empty_PartnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461782919221434", "emailId": "newmisppartner@gmail.com", "partnerType": "", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Empty PartnerType, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Empty_RequestID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": " ", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Empty requestID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": " ", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Empty requestTime, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Empty_langcode_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner13@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": " " }, output={ "errors": [ { "errorCode": "PMS_PRT_056" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Empty lang code, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Invalid_Email_Address_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner@@@@@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Invalid Email Address, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Invalid_PartnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner14@gmail.com", "partnerType": "MISP", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_010" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Invalid PartnerType, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Invalid_PolicyGroup_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner01@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "Automation-invalid-policy-group", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Invalid Policy group, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Invalid_RequestID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Invalid requestID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Invalid_Version_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "version-1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration Invalid Version, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Invalid_langcode_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner15@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "engfrara" }, output={ "errors": [ { "errorCode": "PMS_PRT_056" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with invalid lang code, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Missing_OrganizationName_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "$REMOVE$", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner11@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Missing OrganizationName, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Missing_PartnerID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$REMOVE$", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Empty Partner ID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Null_Address_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": null, "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Null Address, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_SpecialCharacters_PolicyGroup_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner02@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "^^!^(**%", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with SpecialCharacters Policy group, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Version_value0_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration version value 0, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_Version_value1_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration version value 1, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_existing_EmailID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with already registered Email address, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_existing_PartnerID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner10@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_051" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with already registered Partner, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_maxlength_ContactNumber_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461782919221434", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with more than expected values in ContactNumber, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_maxlength_EmailID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461782919221434", "emailId": "this.is.a.really.long.fake.email.address.created.only.for.testing.purposespurposespurposespurposespurpos.and.demonstration.so.please.do.not.try.to.use.it.in.real.life.situations.because.it.is.not.valid@verylongdomainexampleforvalidationtestingpurposeeseseseee.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with more than expected values in EmailID field, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_null_RequestID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": null, "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with null requestID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_null_Version_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "null", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration null Version, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_without_Access_Token_Neg, endPoint=/v1/partnermanager/partners/v3, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration without Access Token, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_without_RequestID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration with Invalid requestID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_without_RequestTime_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration without requestTime, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerRegistration_without_Version_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group 19234", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration without Version, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111555, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot2Partner-111555, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateSUBCA, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111555, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateSUBCA2Partner-111555, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadMISPPartnerCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate111555, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload MISP partner certificate for PMS-111555 partner id, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadMISPPartnerCertificate_Valid_Max_AddressField, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate111558, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload MISP partner certificate for PMS-111558 partner id, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadMISPPartnerCertificate_Valid_Max_Contact_number, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate111559, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload MISP partner certificate for PMS-111559 partner id, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadMISPPartnerCertificate_Valid_Max_EmailID, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate111550, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload MISP partner certificate for PMS-111550 partner id, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadMISPPartnerCertificate_Valid_langcode_Arabic, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate111551, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload MISP partner certificate for PMS-111551 partner id, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadMISPPartnerCertificate_valid_Empty_PolicyGroup, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate111556, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload MISP partner certificate for PMS-111556 partner id, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadMISPPartnerCertificate_without_PolicyGroup_Smoke_Valid, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate111557, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload MISP partner certificate for PMS-111557 partner id, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "policyGroupName": "mosip policy group MISP" }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using valid Access Token, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_AlreadyLinked_PartnerId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PRT_049" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using already linked PartnerId, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_InValid_Request_And_Valid_PartnerId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "invalid-id", "version": "invalid-version", "requestTime": "invalid-request-time", "partnerId": "pms-111557", "policyGroupId": "invalid-policygroupid" }, output={ "responseCode": "400" }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using invalid Request and valid PartnerId, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Invalid_Id_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "invalid-id", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using invalid Id, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using Invalid Access Token, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Auth_Partner_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111999", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PRT_255" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using Auth partner, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Device_Partner_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PRT_255" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using Device partner, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_FTM_Partner_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111888", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PRT_255" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using FTM partner, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Invalid_RequestTime_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "2025-13-99T25:61:61Z", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "responseCode": "400" }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Link Policy Group to MISP Partner using Invalid RequestTime, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Invalid_Version_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "invalid-version", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using Invalid Version, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Valid_Request_And_Invalid_PartnerId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "invalid-partnerid", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using Invalid PartnerId, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Empty_RequestId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using Empty request ID, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using Empty RequestTime, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_NULL_RequestId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "NULL", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using NULL requst ID, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_NULL_Version_Parameter_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "NULL", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using NULL Version Parameter, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Version_Value_0_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using version value as 0, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Version_Value_1_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using version value as 1, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_ObjectBody_Neg, endPoint=/v1/partnermanager/pms-111557/policy-group, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartnerWithoutBody, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using without Object Body, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_Partneradmin_role_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using without Partneradmin role, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_RequestTime_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner using without RequestTime, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_Version_Field_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner without Version field, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_requestId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Linking Policy Group to MISP Partner without requestId, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerExists_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "pms-111555", "partnerType": "MISP_Partner" }, output={ "partnerExists": true, "duplicateExists": false }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExistsResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking MISP Partner Exists for given Partner ID and Email ID, uniqueIdentifier=TC_PMS_MISPPartnerExists_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerExists_With_Email_As_string_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "string", "partnerId": "pms-111555", "partnerType": "MISP_Partner" }, output={ "partnerExists": true, "duplicateExists": true }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExistsResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking MISP Partner Exists with Email ID as string, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerExists_With_Empty_PartnerType_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "pms-111555", "partnerType": "" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking MISP Partner Exists with Empty Partner Type, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerExists_With_Invalid_Access_Token_Neg, endPoint=/v1/partnermanager/partners/exists, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "pms-111555", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking MISP Partner Exists with Invalid Access Token, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerExists_With_Invalid_Id_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "invalid-id", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "pms-111555", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking MISP Partner Exists with Invalid Id, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerExists_With_Invalid_PartnerType_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "pms-111555", "partnerType": "invalid-partner-type" }, output={ "errors": [ { "errorCode": "PMS_PRT_010" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking MISP Partner Exists with Invalid Partner Type, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerExists_With_Invalid_Version_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "invalid-version", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "pms-111555", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking MISP Partner Exists with Invalid Version, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerExists_With_PartnerId_As_string_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "string", "partnerType": "MISP_Partner" }, output={ "partnerExists": true, "duplicateExists": true }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExistsResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking MISP Partner Exists with PartnerId As string, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MISPPartnerExists_With_PartnerType_As_String_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "pms-111555", "partnerType": "string" }, output={ "errors": [ { "errorCode": "PMS_PRT_010" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking MISP Partner Exists with Partner Type as string, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with status approved, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_Filter_with_AuthToken, endPoint=/v1/partnermanager/partners/v3, role=partnerauth, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "Auth_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all th ePartner Id's associated with Auth Partner token, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_Filter_with_DeviceToken, endPoint=/v1/partnermanager/partners/v3, role=partnerdevice, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "false", "partnerType": "Device_Provider" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all th ePartner Id's associated with Device Partner token, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_Filter_with_FTMToken, endPoint=/v1/partnermanager/partners/v3, role=partnerftm, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "false", "partnerType": "FTM_Provider" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all th ePartner Id's associated with FTM Partner token, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_only_Status, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with only query parameter kept as status, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_partnerType_Empty, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with partnerType Empty, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_policyGroupAvailable_Empty, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with policyGroupAvailable Empty, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_policyGroupAvailable_false, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "false", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with status InProgress, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_policyGroupAvailable_true, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with status true, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_status_InProgress, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "InProgress", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with status InProgress, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_InvalidStatus_validPartnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approvedInprogress", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with invalid status and valid partnertype, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/v3, role=invalidtoken, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with invalid access token, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Invalid_partnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with invalid partnerType, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Invalid_query_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "FTM_Provider" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with invalid Special Characters in partnerType, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Partner_Fetching_MISP_Neg, endPoint=/v1/partnermanager/partners/v3, role=partnerauth, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_012" } ] }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with non-Admin user fetching MISP_Partner, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Special_Characters_Status_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "^%!!^!@", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with invalid Special Characters in status, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Special_Characters_partnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "^%!!^!@" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with invalid Special Characters in partnerType, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_invalidStatus_invalidPartnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "activedeactivate", "policyGroupAvailable": "true", "partnerType": "MISP_Partner_Auth_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with invalid status and invalid partnertype, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_lowercase_partnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "misp_partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with invalid Special Characters in partnerType, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_validStatus_invalidPartnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP_Partner_Auth_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all MISP Partner records with valid status and invalid partnertype, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "movp@gmail.com", "organizationName": "movp", "partnerId": "MOVP-AUTOMATION", "partnerType": "Credential_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "MOVP-AUTOMATION", "status": "InProgress" }, inputTemplate=pms/credentialPartner/CreatePartner/createPartner, outputTemplate=pms/credentialPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner self Registrartion with Valid data, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Same_Email, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "movp@gmail.com", "organizationName": "movp", "partnerId": "MOVP-AUTOMATION", "partnerType": "Credential_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/credentialPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner self Registrartion with existing Email, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_WithOut_Mandatory_Neg, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "movp@gmail.com", "organizationName": "movp", "partnerId": "$REMOVE$", "partnerType": "Credential_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/credentialPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner self Registrartion without PartnerID, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_withoutuploadCert_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Without Partner Register, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_Device_Provider_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_Ftm_Provider_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerftm, templateFields=null, input={ "emailId": "mosip98788@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_invalid_email_neg, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "gfhgytth", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_missing_email_neg, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_without_auth_neg, endPoint=/v1/partnermanager/partners/email/verify, role=invalidtoken, templateFields=null, input={ "emailId": "mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificateBeforeCertificateUpload_Neg, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "30" }, output={ "isCertificateAvailable": false }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateBeforeCertificateUpload, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateBeforeCertificateUploadResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificates Before Certificate Upload, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateAuthCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_UploadAgain_Neg, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-PCM-003" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate2, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert which is already uploaded, uniqueIdentifier=TC_PMS_UploadCACertificate_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_with_blank_data, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate4, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert with blank data, uniqueIdentifier=TC_PMS_UploadCACertificate_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_with_invalid_data, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-CRY-003" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate3, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=KER-CRY-003,KER-KMS-013, kycFields=null, description=Upload CA Cert with invalid data, uniqueIdentifier=TC_PMS_UploadCACertificate_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificateDeviceProvider_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateDeviceCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificate_Ftm_Provider_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateFtmCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSubCACertificate_DeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateDeviceSubCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Sub-CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSubCACertificate_Ftm_Provider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateFtmSubCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Sub-CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSubCACertificate_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateAuthSubCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Sub-CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_BeforeCACertificates_upload_neg, endPoint=/v1/partnermanager/partners/trust-chain-certificates?pageNo=0&pageSize=8&issuedTo=PMS_API_CA&issuedBy=PMS_API_CA, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the Logged in Partner, uniqueIdentifier=TC_PMS_GetAllCertificateBeforeCACertificateUpload_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_before_certificate_upload, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerauth, templateFields=null, input={ "partnerId": "pms-111999" }, output={ "errors": [ { "errorCode": "PMS_PRT_108" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates before certificate upload, uniqueIdentifier=TC_PMS_getPartner_certificate_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert, uniqueIdentifier=TC_PMS_uploadPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_UploadAgain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate again, uniqueIdentifier=TC_PMS_uploadPartnerCert_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_invalid_Domain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-PCM-011" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert4, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert by giving invalid domain, uniqueIdentifier=TC_PMS_uploadPartnerCert_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_invalid_certificate_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-KMS-013" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert3, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert by giving invalid cert data, uniqueIdentifier=TC_PMS_uploadPartnerCert_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_missing_PartnerDomain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert2, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert without partnerdomain, uniqueIdentifier=TC_PMS_uploadPartnerCert_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_uploadCertificateDeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCertDeviceProvider, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert, uniqueIdentifier=TC_PMS_uploadPartnerCert_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_uploadCertificateFtmProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerftm, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCertFtmProvider, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert, uniqueIdentifier=TC_PMS_uploadPartnerCert_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_AuthPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerauth, templateFields=null, input={ "partnerId": "pms-111999" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_DeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerdevice, templateFields=null, input={ "partnerId": "pms-111998" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_FtmProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerftm, templateFields=null, input={ "partnerId": "pms-111888" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_with_unregistered_partner_neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerauth, templateFields=null, input={ "partnerId": "848484848" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=TC_PMS_GetPartnerCert_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_Device_allValid_smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ }, output={ "partnerId": "pms-111998", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/GetAllCertificate/getAllCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the Loggedin Partner, uniqueIdentifier=TC_PMS_GetAllCertificate_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_allValid_smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerauth, templateFields=null, input={ }, output={ "partnerId": "pms-111999", "partnerType": "Auth_Partner", "isCertificateAvailable": true }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/GetAllCertificate/getAllCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the Logged in Partner, uniqueIdentifier=TC_PMS_GetAllCertificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_invalid_auth, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the partner invalid partner, uniqueIdentifier=TC_PMS_GetAllCertificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_without_auth, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the partner without login, uniqueIdentifier=TC_PMS_GetAllCertificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePartnerDetails_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/pms-111999, role=partner, templateFields=null, input={ "address": "Bangalore Ind", "contactNumber": "8553967576", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111999", "status": "approved" }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/UpdatePartner/updatePartnerResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Partner Details for Partner with valid data, uniqueIdentifier=TC_PMS_updatePartnerDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePartnerDetails_Missing_InputParameter_Address, endPoint=/v1/partnermanager/partners/Tech-123, role=partner, templateFields=null, input={ "address": "$REMOVE$", "contactNumber": "8553967576", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Partner Details for Partner while keeping Address parameter as missing, uniqueIdentifier=TC_PMS_updatePartnerDetails_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePartnerDetails_Missing_InputParameter_contactNumber, endPoint=/v1/partnermanager/partners/Tech-123, role=partner, templateFields=null, input={ "address": "Bangalore Ind", "contactNumber": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Partner Details for Partner while keeping Contact Number parameter as missing, uniqueIdentifier=TC_PMS_updatePartnerDetails_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePartnerDetails_invalid_partnerId, endPoint=/v1/partnermanager/partners/Tech-1231234, role=partner, templateFields=null, input={ "address": "Bangalore Ind", "contactNumber": "8553967576", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Partner Details for Partner with invalid partnerID, uniqueIdentifier=TC_PMS_updatePartnerDetails_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/credentialPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/credentialPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Certificate for Partner, uniqueIdentifier=TC_PMS_uploadCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_with_invalid_certs_data, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-CRY-003" } ] }, inputTemplate=pms/credentialPartner/UploadCertificate/uploadInvalidCertificate, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=KER-CRY-003,KER-KMS-013, kycFields=null, description=Upload CA Certificate for Partner with invalid certificate data, uniqueIdentifier=TC_PMS_uploadCert_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/credentialPartner/UploadCertificate/uploadSUBCACertificate, outputTemplate=pms/credentialPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload SUBCA Certificate for Partner, uniqueIdentifier=TC_PMS_uploadCert_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/credentialPartner/UploadCert/uploadCert, outputTemplate=pms/credentialPartner/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid Partner certificate for Partner, uniqueIdentifier=TC_PMS_uploadPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MOVP-AUTOMATION" }, output= { "partnerID": "MOVP-AUTOMATION", "errors": "[]" }, inputTemplate=pms/credentialPartner/GetPartner/getPartner, outputTemplate=pms/credentialPartner/GetPartner/getPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive Partner details, uniqueIdentifier=TC_PMS_getPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartner_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "abcd" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/credentialPartner/GetPartner/getPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive Partner details with invalid PartnerID, uniqueIdentifier=TC_PMS_getPartnerCert_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partner, templateFields=null, input={ "partnerId": "MOVP-AUTOMATION" }, output= { }, inputTemplate=pms/credentialPartner/GetCertificate/getCert, outputTemplate=pms/credentialPartner/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive Partner certificate, uniqueIdentifier=TC_PMS_getPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_allValid_smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ "partnerId": "pms-111999" }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerIdResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_invalid_auth, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id with invalid token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_without_auth, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id without token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_BeforePolicyMapping_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Before Policy Mapping, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerBeforePolicyMapping_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/pms-111999/contact/add, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9903255448", "emailId": "print@email.com", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Contact details for Partner with Valid data, uniqueIdentifier=TC_PMS_AddContact_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_Missing_InputParameter_address, endPoint=/v1/partnermanager/partners/pms-111999/contact/add, role=partner, templateFields=null, input={ "address": "$REMOVE$", "contactNumber": "9903255448", "emailId": "print@email.com", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.address" } ] }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create contact details for the Partner while keeping the address parameter as missing, uniqueIdentifier=TC_PMS_AddContact_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_Missing_InputParameter_contactNumber, endPoint=/v1/partnermanager/partners/pms-111999/contact/add, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "$REMOVE$", "emailId": "print@email.com", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create contact details for the Partner while keeping the contactNumber parameter as missing, uniqueIdentifier=TC_PMS_AddContact_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_Missing_InputParameter_emailId, endPoint=/v1/partnermanager/partners/pms-111999/contact/add, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9903255448", "emailId": "$REMOVE$", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create contact details for the Partner while keeping the emailID parameter as missing, uniqueIdentifier=TC_PMS_AddContact_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CredPartnerApiKeyRequest_With_Invalid_policyName_useCaseDescription_neg, endPoint=/v1/partnermanager/partners/MOVP-AUTOMATION/policy/map, role=partner, templateFields=null, input={ "policyName": "mosip@8474748", "useCaseDescription": "mosi182736@636", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner API Key Request for Credential Partner with invalid Policy Name use case description, uniqueIdentifier=TC_PMS_RequestAPIKeyCredentialPartner_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CredPartnerApiKeyRequest_With_Invalid_useCaseDescription_neg, endPoint=/v1/partnermanager/partners/MOVP-AUTOMATION/policy/map, role=partner, templateFields=null, input={ "policyName": "mosip@8474748", "useCaseDescription": "mosip data share policy", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner API Key Request for Credential Partner with invalid use case description, uniqueIdentifier=TC_PMS_RequestAPIKeyCredentialPartner_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SubmitPartnerApiKeyRequest_Approval_All_for_Deactivated_policy, endPoint=/v1/partnermanager/partners/Tech-1233/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip data share policy ApiKey", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_016" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner API Key Request for Partner with Deactivated Policy, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SubmitPartnerApiKeyRequest_Map_partner_partner_inprogress_state_Neg, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_053" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner API Key Request for Partner and mapping the Partner with Inprogress Policy, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/MOVP-AUTOMATION/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip data share policy", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner API Key Request for Partner with valid data, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_ForDeactivateOIDCNeg_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_ForPending_All_Valid_sid, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip in progress mapping policy 19234", "useCaseDescription": "Need to submit for Pending", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_ForRejecting_All_Valid_sid, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip reject policy 19234", "useCaseDescription": "Need to submit for Rejecting", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_For_MISP_Policy_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/pms-111555/policy/map, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "policyName": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_name$", "useCaseDescription": "Liking the Partner and the Policy" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_invalid_partnerId_neg, endPoint=/v1/partnermanager/partners/1hhggg9/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when invalid partnerId is given, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_invalid_policyName_neg, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "%^776hfgsdf", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when invalid policyname is given, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_missing_policyName_neg, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "$REMOVE$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when policyname is removed from request, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_missing_useCaseDescription_neg, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "useCaseDescription":"$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when usecaseDescription is removed from request, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddBioExtractors_MosipDataSharePolicy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"MOVP-AUTOMATION", "policyId":"MDSP", "requesttime": "$TIMESTAMP$" }, output=null, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractorsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add BioExtractors for MOSIPDataSharePolicy for valid PolicyID, uniqueIdentifier=TC_PMS_addBioExtractors_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddBioExtractors_MosipPolicy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"pms-111999", "policyId":"$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output=null, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractorsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add BioExtractors for MOSIP Policy for valid PolicyID, uniqueIdentifier=TC_PMS_addBioExtractors_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddBioExtractors_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"abcd", "policyId":"MDSP", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add BioExtractors for invalid PartnerID, uniqueIdentifier=TC_PMS_addBioExtractors_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddBioExtractors_invalid_policyId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"MOVP-AUTOMATION", "policyId":"abcd", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add BioExtractors for invalid PolicyID, uniqueIdentifier=TC_PMS_addBioExtractors_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingKey_Missing_InputParameter_status, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "$REMOVE$", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/authPartner/RejectMappingKey/RejectMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Approved Partner while keeping the Status parameter as missing, uniqueIdentifier=TC_PMS_RejectAPIKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_ForDeactivateOIDCNeg_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_ForDeactivateOIDCNeg_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=TC_PMS_ApproveAPIKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_For_MISP_Policy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_For_MISP_Policy_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Map_partner_toalready_mapped_policy_neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PM_034" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Missing_Request_Time_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Missing_status_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "status": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_PastDate_Request_Time_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Reject_All_Valid, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Rejected", "mappingkey": "$ID:partnerPolicyMapping_ForRejecting_All_Valid_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping rejected successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Rejected_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_SpaceIn_mapping_key_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "requesttime": "$TIMESTAMP$", "mappingkey": " " }, output={ "errors": [ { "errorCode": "PMS_PMP_007" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_invalid_auth, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies with invalid role, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_without_auth, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies without login token, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all Approved Auth Partner Policies, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_invalid_auth, endPoint=/v1/partnermanager/partners/auth-partners-policies, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all Approved Auth Partner Policies with invalid token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_without_auth, endPoint=/v1/partnermanager/partners/auth-partners-policies, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all Approved Auth Partner Policies without token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_BeforeApiKeyGenerated_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Without Partner Register, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerBeforeApiKeyGenerated_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_AllValid_smoke_sid, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "pms-111999", "label": "string" }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/GenerateApiKey/generateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_InValid_policy_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "dfbgafb", "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_014", "message": "Policy does not exist" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate Api Keys for Approved Policies with invalid policy, uniqueIdentifier=TC_PMS_GenerateApikey_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Missing_Request_time_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "String" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Missing_label_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 192341", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Missing_policyName_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_PastDate_Request_time_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "string", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Regenerate_Same_Key_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_110" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy", "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "pms-111999", "label": "string" }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/GenerateApiKey/generateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_ActivateDeactivatePartnerApiKey_Lable_Removed_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "MDSP", "label": "$REMOVE$", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Activated PartnerAPIKey as Activate by Removing label, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_ActivateDeactivatePartnerApiKey_activate_Dublicate_Lable_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "MDSPK", "label": "string", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Activated PartnerAPIKey as Activate by Providing Duplicate label, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_ActivateDeactivatePartnerApiKey_invalid_label, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "MDSP", "label": "asdfsad", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid Label, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_activate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "label": "string", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ "response": "Partner apikey activated successfully." }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Activated PartnerAPIKey as Activate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_deactivate_InValid_APIKey_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "Tech-1233", "policyId": "policyid", "label": "string", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid APIKey, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_deactivate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "label": "string", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "response": "Partner apikey deactivated successfully." }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated PartnerAPIKey as Deactivate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "asdfgrwg", "policyId": "MDSP", "label": "string", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid PartnerId, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_invalid_policyId, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "asfv", "label": "string", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid PolicyId, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_InsertDBData_For_API_Key_10_days, endPoint=no endpoint, role=partnerauth, templateFields=null, input={ "policy_id": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/InsertAPIKeyData10daysAPIKey, outputTemplate=pms/InsertDBData/InsertAPIKeyDataResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Inserting data in partner policy table for creation of API Key ID, uniqueIdentifier=TC_DBDependent_InsertQuery_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_InsertDBData_For_API_Key_15_days, endPoint=no endpoint, role=partnerauth, templateFields=null, input={ "policy_id": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/InsertAPIKeyData15daysAPIKey, outputTemplate=pms/InsertDBData/InsertAPIKeyDataResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Inserting data in partner policy table for creation of API Key ID, uniqueIdentifier=TC_DBDependent_InsertQuery_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_InsertDBData_For_API_Key_Valid_smoke_Pos, endPoint=no endpoint, role=partnerauth, templateFields=null, input={ "policy_id": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/InsertAPIKeyData, outputTemplate=pms/InsertDBData/InsertAPIKeyDataResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Inserting data in partner policy table for creation of API Key ID, uniqueIdentifier=TC_DBDependent_InsertQuery_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_invalid_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner with invalid token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_without_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner without token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_invalid_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner with invalid token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_without_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner without token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests, uniqueIdentifier=TC_PMS_partner-policy-requests_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_With_policyId_given, endPoint=/v1/partnermanager/partner-policy-requests?policyId={policyId}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "2", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for policyId which contains '2', uniqueIdentifier=TC_PMS_partner-policy-requests_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_combination_search_twofields, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}&requestDetails={requestDetails}, role=partnerauth, templateFields=null, input={ "partnerId": "1", "requestDetails": "2", "status": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving value for partnerId and requestDetails, uniqueIdentifier=TC_PMS_partner-policy-requests_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_orgname_given, endPoint=/v1/partnermanager/partner-policy-requests?orgName={orgName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "1", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for orgName which contains '1', uniqueIdentifier=TC_PMS_partner-policy-requests_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_pageNo_given, endPoint=/v1/partnermanager/partner-policy-requests?pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageNo": "8", "status": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageSize": "5", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving valid page number given, uniqueIdentifier=TC_PMS_partner-policy-requests_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_partnerId_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "a", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for PartnerId which contains 'a', uniqueIdentifier=TC_PMS_partner-policy-requests_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_partnerType_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerType={partnerType}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "a" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for partnerType which contains 'a', uniqueIdentifier=TC_PMS_partner-policy-requests_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_policygroupname_given, endPoint=/v1/partnermanager/partner-policy-requests?policyGroupName={policyGroupName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "Group", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for policyGroupName which contains 'Group', uniqueIdentifier=TC_PMS_partner-policy-requests_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_policyname_given, endPoint=/v1/partnermanager/partner-policy-requests?policyName={policyName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "policy", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for policyName which contains 'policy', uniqueIdentifier=TC_PMS_partner-policy-requests_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_random_value_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "status": "$REMOVE$", "partnerId": "&&&abcdf", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving random value for partnerid, uniqueIdentifier=TC_PMS_partner-policy-requests_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_requestDetails_given, endPoint=/v1/partnermanager/partner-policy-requests?requestDetails={requestDetails}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "ab", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for requestDetails which contains 'ab', uniqueIdentifier=TC_PMS_partner-policy-requests_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_sortType_ASC, endPoint=/v1/partnermanager/partner-policy-requests?sortType={sortType}, role=partnerauth, templateFields=null, input={ "sortType": "ASC", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by sort type ASC for the given sort field, uniqueIdentifier=TC_PMS_partner-policy-requests_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_sortType_DESC, endPoint=/v1/partnermanager/partner-policy-requests?sortType={sortType}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "DESC", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by sort type DESC for the given sort field, uniqueIdentifier=TC_PMS_partner-policy-requests_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_Inprogress, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "InProgress", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for which status as Inprogress, uniqueIdentifier=TC_PMS_partner-policy-requests_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_approved, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "approved", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for which status as approved, uniqueIdentifier=TC_PMS_partner-policy-requests_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_rejected, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "rejected", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for which status as rejected, uniqueIdentifier=TC_PMS_partner-policy-requests_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_Invalid_Token_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests with invalid token, uniqueIdentifier=TC_PMS_partner-policy-requests_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_pageNo_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "pageNo": "-9", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving negative pageNo value, uniqueIdentifier=TC_PMS_partner-policy-requests_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_pageSize_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "pageSize": "-9", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving negative pagesize value, uniqueIdentifier=TC_PMS_partner-policy-requests_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "sortFieldName": "$%^%^&&^", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests with invalid sortfieldname, uniqueIdentifier=TC_PMS_partner-policy-requests_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_sortType_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "sortType": "hdjfdfhg", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by invalid sort type, uniqueIdentifier=TC_PMS_partner-policy-requests_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_without_Authentication_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests without authentication, uniqueIdentifier=TC_PMS_partner-policy-requests_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_All_Valid_Smoke, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partnered in the system, uniqueIdentifier=TC_PMS_GetListOfPartners_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_All_Valid_Smoke_admin_dashboard, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partnered in the system, uniqueIdentifier=TC_PMS_GetListOfPartners_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_Filter_OrgName_SortType_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=orgName&sortType=ASC&pageNo=0&pageSize=8&orgName=partner, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by organization name and sorted in ascending order, uniqueIdentifier=TC_PMS_GetListOfPartners_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_Filter_isActive_type_true, endPoint=/v1/partnermanager/admin-partners?pageSize=8&isActive=true, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all the Active partners, uniqueIdentifier=TC_PMS_GetListOfPartners_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_Invalid_token_Neg, endPoint=/v1/partnermanager/admin-partners, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus, endPoint=/v1/partnermanager/admin-partners?certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by certificateUploadStatus, uniqueIdentifier=TC_PMS_GetListOfPartners_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=asc&certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by certificateUploadStatus in ascending order, uniqueIdentifier=TC_PMS_GetListOfPartners_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus_asc_without_sortFieldName_Neg, endPoint=/v1/partnermanager/admin-partners?sortType=asc&certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by certificateUploadStatus in ascending order and without sortFieldName, uniqueIdentifier=TC_PMS_GetListOfPartners_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus_desc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=desc&certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by certificateUploadStatus in descending order, uniqueIdentifier=TC_PMS_GetListOfPartners_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_emailAddress_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by partnerid and sorted in ascending order, uniqueIdentifier=TC_PMS_GetListOfPartners_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_empty_pageno_Neg, endPoint=/v1/partnermanager/admin-partners?pageNo=111111, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_empty_partnerid_Neg, endPoint=/v1/partnermanager/admin-partners?partnerId=bcbcb, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_empty_partnertype_Neg, endPoint=/v1/partnermanager/admin-partners?partnerType=dfdgd, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_pageno_Neg, endPoint=/v1/partnermanager/admin-partners?pageNo=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_pagesize_Neg, endPoint=/v1/partnermanager/admin-partners?pageSize=-12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_partnerid_Neg, endPoint=/v1/partnermanager/admin-partners?partnerId=-dndn333, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_partnertype_Neg, endPoint=/v1/partnermanager/admin-partners?partnerType=2233ddd, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=-1&sortType=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by sortFieldName with invalid data, uniqueIdentifier=TC_PMS_GetListOfPartners_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_sortType_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered with invalid sortType, uniqueIdentifier=TC_PMS_GetListOfPartners_34 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_sortfield_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=a2a33, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_sorttype_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=a2a33, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_partnerType_Sort_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=asc&pageSize=8&partnerType=Auth, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by partnerType and sorted in ascending order, uniqueIdentifier=TC_PMS_GetListOfPartners_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_partnerType_Sort_desc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=desc&pageSize=8&partnerType=Auth, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by partnerType and sorted in descending order, uniqueIdentifier=TC_PMS_GetListOfPartners_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_partnerid_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by partnerid and sorted in ascending order, uniqueIdentifier=TC_PMS_GetListOfPartners_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_partnerid_desc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by partnerid and sorted in descending order, uniqueIdentifier=TC_PMS_GetListOfPartners_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_deactivated_partner_Neg, endPoint=/v1/partnermanager/admin-partners?isActive=false, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_emailAddress_Neg, endPoint=/v1/partnermanager/admin-partners?emailAddress=454646, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_organization_name_Neg, endPoint=/v1/partnermanager/admin-partners?orgName=123@1sse, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_policyGroup_Name_Neg, endPoint=/v1/partnermanager/admin-partners?policyGroupName=, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with empty policyGroup Name, uniqueIdentifier=TC_PMS_GetListOfPartners_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_sort_Neg, endPoint=/v1/partnermanager/admin-partners?sortType=&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_email_Neg, endPoint=/v1/partnermanager/admin-partners?emailAddress=2t63t@@@, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_organization_name_Neg, endPoint=/v1/partnermanager/admin-partners?orgName=123@1sse, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_policyGroup_Name_Neg, endPoint=/v1/partnermanager/admin-partners?policyGroupName=-12, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_sort_Neg, endPoint=/v1/partnermanager/admin-partners?sortType=3@@#&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_not_uploaded_email_Neg, endPoint=/v1/partnermanager/admin-partners?certificateUploadStatus=not_uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111777" }, output= { "partnerId": "pms-111777" }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_DevicePartner_All_Valid_Smoke, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111998" }, output= { "partnerId": "pms-111998" }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Device Partner Deatils, uniqueIdentifier=TC_PMS_GetPartnerDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_invalid_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=invalidtoken, templateFields=null, input={ "partnerId": "111777" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_admin_role_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "111777" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_invalid_partner_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "@334ds356" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_unauthor_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=resident, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_unauthorized_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=resident, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_without_admin_role_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=idrepo, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_All_Valid_Smoke, endPoint=/v1/policymanager/policies/v2, role=partneradmin, templateFields=null, input={ }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies in the system, uniqueIdentifier=TC_PMS_listofPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_invalid_token_neg, endPoint=/v1/policymanager/policies/v2, role=POLICYMANAGER, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies invalid token, uniqueIdentifier=TC_PMS_listofPolicies_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_combination_twoattributes_valid, endPoint=/v1/policymanager/policies/v2?policyId={policyId}&policyName={policyName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "1", "policyName": "1", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyName and policyid given, uniqueIdentifier=TC_PMS_listofPolicies_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_negative_pageNo_neg, endPoint=/v1/policymanager/policies/v2?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "-6", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageNo as '-6', uniqueIdentifier=TC_PMS_listofPolicies_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_negative_pageSize_neg, endPoint=/v1/policymanager/policies/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "-6", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageSize as '-6', uniqueIdentifier=TC_PMS_listofPolicies_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_pageNo_specified_valid, endPoint=/v1/policymanager/policies/v2?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "6", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageNo as '6', uniqueIdentifier=TC_PMS_listofPolicies_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_pagesize_specified_valid, endPoint=/v1/policymanager/policies/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "6", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageSize as '6', uniqueIdentifier=TC_PMS_listofPolicies_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyDescription_random_invalid_neg, endPoint=/v1/policymanager/policies/v2?policyDescription={policyDescription}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "3fdfds", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "0" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyDescription as '3fdfds', uniqueIdentifier=TC_PMS_listofPolicies_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyDescription_valid, endPoint=/v1/policymanager/policies/v2?policyDescription={policyDescription}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "a", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyDescription as 'a', uniqueIdentifier=TC_PMS_listofPolicies_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyGroupName_valid, endPoint=/v1/policymanager/policies/v2?policyGroupName={policyGroupName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "ab", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyGroupName as 'ab', uniqueIdentifier=TC_PMS_listofPolicies_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyId_valid, endPoint=/v1/policymanager/policies/v2?policyId={policyId}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "1", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyId as '1', uniqueIdentifier=TC_PMS_listofPolicies_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyName_valid, endPoint=/v1/policymanager/policies/v2?policyName={policyName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "a", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyName as 'a', uniqueIdentifier=TC_PMS_listofPolicies_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortFieldName_invalid_neg, endPoint=/v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "hfghfgdhf", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype, uniqueIdentifier=TC_PMS_listofPolicies_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortFieldName_valid, endPoint=/v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "status", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype, uniqueIdentifier=TC_PMS_listofPolicies_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortType_asc, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortType as 'asc', uniqueIdentifier=TC_PMS_listofPolicies_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortType_desc, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "desc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortType as 'desc', uniqueIdentifier=TC_PMS_listofPolicies_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortType_invalid_neg, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "abdcfegff", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortType as 'abdcfegff', uniqueIdentifier=TC_PMS_listofPolicies_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_status_activated, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "activated" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with status as 'activated', uniqueIdentifier=TC_PMS_listofPolicies_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_status_deactivated, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "deactivated" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with status as 'deactivated', uniqueIdentifier=TC_PMS_listofPolicies_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_status_draft, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "draft" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with status as 'draft', uniqueIdentifier=TC_PMS_listofPolicies_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_without_Authentication_neg, endPoint=/v1/policymanager/policies/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies without authentication, uniqueIdentifier=TC_PMS_listofPolicies_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfPoliciesRequest/getListOfPoliciesRequest, outputTemplate=pms/GetListOfPoliciesRequest/getListOfPoliciesRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies Request in the system, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_ForNeg_all_Valid_sid, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_RedirectUri_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$abcdefg", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid redirectUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_auth_neg, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without token, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_granttypes_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "hghghgg", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid granttypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_logoUri_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https//", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid logoUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_policyID_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89767", "policyId": "fgdggh", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid policyid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_publickey_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": {}, "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid publickkey, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_without_granttypes_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "$REMOVE$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without granttypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_without_name_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "$REMOVE$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without name field, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_without_publickey_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$REMOVE$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without publickkey, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOauthClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOauthClient/getAllOauthClient, outputTemplate=pms/GetAllOauthClient/getAllOauthClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "ACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClientUpdate, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_Invalid_Auth, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_without_Auth, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_Requesttime_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientAuthMethods_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": $REMOVE$, "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}] }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientNameLangMap_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientName_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_client_id_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "client_id": " ", "requesttime": "$TIMESTAMP$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_grantTypes_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "grantTypes": $REMOVE$, "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_logoUri_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_redirectUris_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_status_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Retry_with_Deactivated_ClientId_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_ESI_008" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "INACTIVE" }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_GetConfiguration_allValid_smoke, endPoint=/v1/partnermanager/system-config, role=partner, templateFields=null, input={ }, output={ "grantTypes": "authorization_code", "axiosTimeout": "3", "inActivityTimer": "25", "inActivityPromptTimer": "5", "clientAuthMethods": "private_key_jwt" }, inputTemplate=pms/GetConfiguration/GetConfiguration, outputTemplate=pms/GetConfiguration/GetConfigurationResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_before_consent_given, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "pms-111999" }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/GetUserConsent/GetUserConsentResultBeforeConsent, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent before consent is saved, uniqueIdentifier=TC_pms_GetUserConsent_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_AllValid_Smoke, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "pms-111999" }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/SaveUserConsent/SaveUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=save User Consent, uniqueIdentifier=TC_PMS_saveUserConsent_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_invalid_roles_Neg, endPoint=/v1/partnermanager/users/user-consent, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=save User Consent when authentication is done with invalid roles, uniqueIdentifier=TC_PMS_saveUserConsent_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_invalid_user_Neg, endPoint=/v1/partnermanager/users/user-consent, role=regproc, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=save User Consent for invalid user, uniqueIdentifier=TC_PMS_saveUserConsent_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_without_authentication_Neg, endPoint=/v1/partnermanager/users/user-consent, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=save User Consent without authentication, uniqueIdentifier=TC_PMS_saveUserConsent_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_Get_consent_status_invalid_auth_token_neg, endPoint=/v1/partnermanager/users/user-consent, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve PMS GetUserConsent Status with an Invalid Auth Token, uniqueIdentifier=TC_pms_GetUserConsent_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_Get_consent_status_invalid_user_neg, endPoint=/v1/partnermanager/users/user-consent, role=regproc, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent Status for invalid User and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetUserConsent_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_Get_consent_status_without_access_token_neg, endPoint=/v1/partnermanager/users/user-consent, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent Status Without an Access Token and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetUserConsent_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_allValid_smoke, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "pms-111999" }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/GetUserConsent/GetUserConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent for All Valid Smoke, uniqueIdentifier=TC_pms_GetUserConsent_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_DeviceProvider_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerftm, templateFields=null, input={ "partnerId": "pms-111888" }, output={ }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original ftm partner certificates, uniqueIdentifier=TC_PMS_getPartner_certificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerauth, templateFields=null, input={ "partnerId": "pms-111999" }, output={ }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates, uniqueIdentifier=TC_PMS_getPartner_certificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_invalid_roles_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerdevice, templateFields=null, input={ "partnerId": "pms-111999" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_007" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates when authenticated as device partner, uniqueIdentifier=TC_PMS_getPartner_certificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_random_partnerid_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partneradmin, templateFields=null, input={ "partnerId": "xyz12345abcdef" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates random value for partnerid, uniqueIdentifier=TC_PMS_getPartner_certificate_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_without_authentication_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111999" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates without authentication, uniqueIdentifier=TC_PMS_getPartner_certificate_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_without_partnerid_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partneradmin, templateFields=null, input={ "partnerId": "" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates without partnerid, uniqueIdentifier=TC_PMS_getPartner_certificate_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "oldmisp@gmail.com", "organizationName": "misp", "partnerId": "MISP-AUTOMATION", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "MISP-AUTOMATION", "status": "InProgress" }, inputTemplate=pms/mispPartner/CreatePartner/createPartner, outputTemplate=pms/mispPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_MispLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "mis2p@gmail.com", "organizationName": "misp2", "partnerId": "MISP2-AUTOMATION", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "MISP2-AUTOMATION", "status": "InProgress" }, inputTemplate=pms/mispPartner/CreatePartner/createPartner, outputTemplate=pms/mispPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration for Misp License, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_MispLicense_Msip_Smoke, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "90110300", "emailId": "mis3p@gmail.com", "organizationName": "misp3", "partnerId": "MISP3", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "MISP3", "status": "InProgress" }, inputTemplate=pms/mispPartner/CreatePartner/createPartner, outputTemplate=pms/mispPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration for Misp License, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/mispPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner, uniqueIdentifier=TC_PMS_uploadCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCertificate/uploadSUBCACertificate, outputTemplate=pms/mispPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner, uniqueIdentifier=TC_PMS_uploadCert_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "partnerId": "MISP-AUTOMATION", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCert/uploadCert, outputTemplate=pms/mispPartner/UploadCert/uploadCertResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid certificate for Misp Partner, uniqueIdentifier=TC_PMS_UploadPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCert_MispLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "partnerId": "MISP2-AUTOMATION", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCert/uploadCert2, outputTemplate=pms/mispPartner/UploadCert/uploadCertResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid certificate for Misp License, uniqueIdentifier=TC_PMS_UploadPartnerCert_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCert_MispLicense_MISP3_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "partnerId": "MISP3", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCert/uploadCert2, outputTemplate=pms/mispPartner/UploadCert/uploadCertResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid certificate for Misp License with valid PartnerID, uniqueIdentifier=TC_PMS_UploadPartnerCert_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MISP-AUTOMATION" }, output= { "partnerID": "MISP-AUTOMATION" }, inputTemplate=pms/mispPartner/GetPartner/getPartner, outputTemplate=pms/mispPartner/GetPartner/getPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Misp Partner details, uniqueIdentifier=TC_PMS_getPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartner_MISP3_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MISP3" }, output= { "partnerID": "MISP3" }, inputTemplate=pms/mispPartner/GetPartner/getPartner, outputTemplate=pms/mispPartner/GetPartner/getPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Misp Partner details with valid PartnerId, uniqueIdentifier=TC_PMS_getPartnerCert_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partner, templateFields=null, input={ "partnerId": "MISP-AUTOMATION" }, output= { }, inputTemplate=pms/mispPartner/GetCertificate/getCert, outputTemplate=pms/mispPartner/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Misp Partner Certificate, uniqueIdentifier=TC_PMS_getPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ } }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details with valid details, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_AlreadyExists_Invalid, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_AUT_003" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping already exisits Model, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_DeviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Slab", "deviceTypeCode": "test", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_AUT_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping DeviceId as empty, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceProviderId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$REMOVE$", "deviceSubTypeCode": "Slab", "deviceTypeCode": "Finger", "id": "device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping DeviceProviderId as empty, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceSubTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "$REMOVE$", "deviceTypeCode": "Finger", "id": "device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping DeviceSubTypeCode as empty, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Slab", "deviceTypeCode": "$REMOVE$", "id": "device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping DeviceTypeCode as empty, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_sameMakeModelType_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Single", "deviceTypeCode": "Finger", "id": "device-id-124", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping same Make Model Type with valid details, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_sameMakeModel_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Single", "deviceTypeCode": "Iris", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping same Make Model with valid details, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_sameTypeSubType_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcdef", "model": "FRO900000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping same Type SubType with valid details, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectDeviceDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "device-id-123", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/device/makeAndModel/approve/approveDeviceDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject Device Details with valid details, uniqueIdentifier=TC_PMS_rejectDeviceDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectDeviceDetail_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "device-id-123", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject Device Details while keeping approvalStatus as empty, uniqueIdentifier=TC_PMS_rejectDeviceDetail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectDeviceDetail_Missing_InputParameter_deviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$REMOVE$", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject Device Details while keeping deviceId as empty, uniqueIdentifier=TC_PMS_rejectDeviceDetail_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectDeviceDetail_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "device-id-124", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/device/makeAndModel/approve/approveDeviceDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject Device Details with valid details, uniqueIdentifier=TC_PMS_rejectDeviceDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveRejectDeviceDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "device-id-123", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/device/makeAndModel/approve/approveDeviceDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device details for Approved Partner as Activate, uniqueIdentifier=TC_PMS_createApproveRejectDeviceDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveRejectDeviceDetail_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "device-id-123", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device details for Approved Partner while keeping approvalStatus as empty, uniqueIdentifier=TC_PMS_createApproveRejectDeviceDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveRejectDeviceDetail_Missing_InputParameter_deviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$REMOVE$", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device details for Approved Partner as Activate while keeping deviceId as empty, uniqueIdentifier=TC_PMS_createApproveRejectDeviceDetail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "device-id-123", "isActive": true, "isItForRegistrationDevice": true, "make": "abcdef", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/device/makeAndModel/update/updateDeviceDetailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail with valid details, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_DeviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Slab", "deviceTypeCode": "Finger", "id": "$REMOVE$", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail while keeping DeviceId as empty, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceProviderId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$REMOVE$", "deviceSubTypeCode": "Slab", "deviceTypeCode": "Finger", "id": "device-id-123", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_AUT_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail while keeping DeviceProvideId as empty, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceSubTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "$REMOVE$", "deviceTypeCode": "Finger", "id": "device-id-123", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail while keeping DeviceSubTypeCode as empty, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Slab", "deviceTypeCode": "$REMOVE$", "id": "device-id-123", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail while keeping DeviceTypeCode as empty, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_afterReject_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Single", "deviceTypeCode": "Finger", "id": "device-id-124", "isActive": true, "isItForRegistrationDevice": true, "make": "abcdef", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/device/makeAndModel/update/updateDeviceDetailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail afterReject, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asff", "type": "all", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "all", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "asdf", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_To_MapSBI, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "device-id-321" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter to MapSBI, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter with valid values, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_all_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "all", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "fieldID": "id", "fieldCode": "device-id-123" }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter with valid values, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_AllValid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type with all valid details, uniqueIdentifier=TC_PMS_createSearchDeviceType_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "t" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceType_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceType_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_Smoke_sid, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "t" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type, uniqueIdentifier=TC_PMS_createSearchDeviceType_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType__Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceType_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_invalid_sort_field, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "mo@@@del", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping sortField parameter as invalid, uniqueIdentifier=TC_PMS_createSearchDeviceType_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_invalid_sort_type, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "dc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping sortType parameter as invalid, uniqueIdentifier=TC_PMS_createSearchDeviceType_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_missing_columnName, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-311" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping columnName parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceType_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_missing_sort_field, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping sortField parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceType_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_missing_sort_type, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping sortType parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceType_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_missing_type, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "$REMOVE$", "value": "Touchless" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping Type parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceType_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_AllValid_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details with all valid data, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "id", "type": "equals", "value": "device-id-123" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_sort_type_desc_equals_Smoke_sid, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "id", "type": "equals", "value": "device-id-123" } ], "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while Type parameter as Equals and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_invalid_columnName, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "mo@@@@@@@2334412345del", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310", "message": "Invalid column received : mo@@@@@@@2334412345del" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details with invalid columnName, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_invalid_sort_field, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "mo@@@del", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357", "message": "Invalid sort field mo@@@del" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while keeping sortField parameter as invalid, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_invalid_sort_type, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "dc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358", "message": "Sort type dc is not supported" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while keeping sortType parameter as invalid, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_missing_sort_field, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "$REMOVE$", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314", "message": "Missing sort field or sort type values" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while keeping sortField parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_missing_sort_type, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314", "message": "Missing sort field or sort type values" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while keeping sortType parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_missing_type, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "$REMOVE$", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312", "message": "Filter type is missing" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while keeping Type parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBIBeforeAddingSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ }, output= { "pageNo": "0" }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIBeforAddingSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI, uniqueIdentifier=TC_PMS_SBI_List_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ "swBinaryHash": "devicehaadsassh", "swVersion": "deviceswasdasd", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_Missing_partnerId_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2222-12-30T08:23:57.986Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface while keeping parameter PartnerId as empty, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_Missing_swVersion_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2222-12-30T08:23:57.986Z", "swVersion": "$REMOVE$", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface while keeping parameter swVersion as empty, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_SpaceVal_partnerId_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "pms- 111998" }, output={ "errors": [ { "errorCode": "PMS_AUT_002" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface while keeping parameter SpaceVal as empty, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_TO_Map_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.04", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface To Map sId, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_Valid_ForDeactivate_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.05", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface with valid details, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_Valid_Smoke_ForReject_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.03", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface with valid details, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.02", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface with valid details, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_dublicate_swVersion_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ "errors": [ { "errorCode": "PMS_AUT_512" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface with duplicate swVersion, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectSecureBiometricInterface_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_ForReject_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject SecureBiometricInterface with valid detais, uniqueIdentifier=TC_PMS_RejectSecureBiometricInterface_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectSecureBiometricInterface_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterface, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject SecureBiometricInterface while keeping parameter approvalStatus as Empty, uniqueIdentifier=TC_PMS_RejectSecureBiometricInterface_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectSecureBiometricInterface_SpaVal_neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "a0f2b0ca-92 66-4cf4-832c-7741d5b6a174", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterface, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject SecureBiometricInterface with SpaVal invalid, uniqueIdentifier=TC_PMS_RejectSecureBiometricInterface_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveSecureBiometricInterface_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approvr Secure Biometric Interface with valid details, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveSecureBiometricInterface_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approvr Secure Biometric Interface while keeping parameter approval status as empty, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveSecureBiometricInterface_ToMap_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$ID:SaveSecureBiometricInterface_TO_Map_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approvr Secure Biometric Interface with valid details, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveSecureBiometricInterface_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approvr Secure Biometric Interface with valid details, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateSecureBiometricInterface_AfterReject_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_ForReject_sid_id$", "approvalStatus": "Activate" }, output={ "errors": [ { "errorCode": "PMS_AUT_518" } ] }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create UpdateSecureBiometricInterface AfterRejectwith valid details, uniqueIdentifier=TC_PMS_createUpdateSecureBiometricInterface_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateSecureBiometricInterface_DeviceProvider_AllValid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "approvalStatus": "Activate" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateSecureBiometricInterface_Missing_InputParameter_Id, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "id": "$REMOVE$", "approvalStatus": "Activate" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create UpdateSecureBiometricInterface while keeping parameter ID as empty, uniqueIdentifier=TC_PMS_createUpdateSecureBiometricInterface_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateSecureBiometricInterface_ReApprove_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "approvalStatus": "Activate" }, output={ "errors": [ { "errorCode": "PMS_AUT_517" } ] }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create UpdateSecureBiometricInterface AfterRejectwith valid details, uniqueIdentifier=TC_PMS_createUpdateSecureBiometricInterface_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchSecureBiometric_AllValid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Secure Biometric with valid details, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchSecureBiometric_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "providerId", "type": "equals", "value": "Tech-123" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Secure Biometric with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchSecureBiometric_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Secure Biometric with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchSecureBiometric_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "swCreateDateTime", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Secure Biometric with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchSecureBiometric_type_contains_Smoke_asc_sid, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "providerId", "type": "equals", "value": "Tech-123" } ], "sort": [ { "sortField": "swCreateDateTime", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Secure Biometric while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_allValid_smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=partnerdevice, templateFields=null, input={ }, output={ "partnerId": "pms-111998" }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIdsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Approved Device ProviderId, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviders_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Approved Device ProviderIds with invalid access token, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_Without_Authentication_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Approved Device ProviderIds Without Authentication, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_with_Admin_roles_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=device, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Device ProviderIds with Admin roles, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_without_partner_roles_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=device, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Approved Device ProviderIds without_partner_roles, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_UpdateSBIID_10_days_Valid_smoke_Pos, endPoint=no endpoint, role=partnerdevice, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/UpdateSBIID10daysSBIExpiry, outputTemplate=pms/InsertDBData/UpdateSBIIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating SBI ID in SBI table for 10 days Expiry, uniqueIdentifier=TC_UpdateSBID_InsertQuery_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_UpdateSBIID_15_days_Valid_smoke_Pos, endPoint=no endpoint, role=partnerdevice, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/UpdateSBIID15daysSBIExpiry, outputTemplate=pms/InsertDBData/UpdateSBIIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating SBI ID in SBI table for 15 days Expiry, uniqueIdentifier=TC_UpdateSBID_InsertQuery_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_UpdateSBIID_30_days_Valid_smoke_Pos, endPoint=no endpoint, role=partnerdevice, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/UpdateSBIID, outputTemplate=pms/InsertDBData/UpdateSBIIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating SBI ID in SBI table for 30 days Expiry, uniqueIdentifier=TC_UpdateSBID_InsertQuery_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/GetSbiDetailsList/GetAllSbiDetailsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetSbiDetails List for All Valid Inputs, uniqueIdentifier=TC_pms_GetSbiDetailsList_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_partners_sbi_detail_API_with_Admin_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=regproc, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner SBI Details with Admin Role and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_response_Auth_Partner_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Response With Authentication Partner Role and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_response_ftm_Partner_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Response With Authentication Partner Role and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_response_without_Partner_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Response Without Partner Role and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_response_without_authorization_token_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve responce without authorization taken and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceTypeFilter_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "all", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "code", "fieldValue": "Finger", "fieldCode": "Finger" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Type Filter for Partner with valid values, uniqueIdentifier=TC_PMS_DeviceTypeFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceTypeFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asdf", "type": "unique", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Type Filter for Partner while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_DeviceTypeFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceTypeFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Type Filter for Partner while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_DeviceTypeFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceTypeFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Type Filter for Partner while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_DeviceTypeFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceTypeFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "asdf", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Type Filter for Partner while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_DeviceTypeFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partnerdevice, templateFields=null, input={ "filters": [{ "columnName": "deviceType", "type": "unique", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "deviceType", "fieldValue": "Finger", "fieldCode": "Single" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Device SubType Filter, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_ColumnCode_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "all", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create DeviceSubType Filter with valid values, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asdf", "type": "all", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create DeviceSubType Filter while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "all", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create DeviceSubType Filter while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create DeviceSubType Filter while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "asfdg", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create DeviceSubType Filter while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998", "make": "AcmeCorpDeactivate", "model": "X1000Deactivate", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Save Device Details, uniqueIdentifier=TC_PMS_SaveDeviceDetails_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveDeviceDetails_DeviceProviderForPendingApproval_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998", "make": "AcmeCorpApprovalPending", "model": "X1000ApprovalPending", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Save Device Details, uniqueIdentifier=TC_PMS_SaveDeviceDetails_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998", "make": "AcmeCorpReject", "model": "X1000Reject", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Save Device Details, uniqueIdentifier=TC_PMS_SaveDeviceDetails_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998", "make": "AcmeCorp", "model": "X1000", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Save Device Details, uniqueIdentifier=TC_PMS_SaveDeviceDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI, uniqueIdentifier=TC_PMS_SBI_List_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Filter_Expiry_Period_10_days, endPoint=/v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}, role=partnerdevice, templateFields=null, input={ "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "10" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI details filter by Expiry period 10 days, uniqueIdentifier=TC_PMS_SBI_List_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Filter_Expiry_Period_15_days, endPoint=/v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}, role=partnerdevice, templateFields=null, input={ "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "15" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI details filter by Expiry period 15 days, uniqueIdentifier=TC_PMS_SBI_List_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Filter_Expiry_Period_30_days, endPoint=/v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}, role=partnerdevice, templateFields=null, input={ "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "30" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI details filter by Expiry period 30 days, uniqueIdentifier=TC_PMS_SBI_List_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Partner_device_token, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI details with Parter device token, uniqueIdentifier=TC_PMS_SBI_List_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_orgName_valid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "orgName": "1", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with orgName contains '1', uniqueIdentifier=TC_PMS_SBI_List_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_pagesize_given_valid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "pageSize": "12", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "10" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with pageSize specified, uniqueIdentifier=TC_PMS_SBI_List_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_partnerId_valid_sid, endPoint=/v1/partnermanager/securebiometricinterface?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "a", "orgName": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with partnerId contains 'a', uniqueIdentifier=TC_PMS_SBI_List_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_random_value_given_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "partnerId": "^&&%%%", "orgName": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with random value for partnerId, uniqueIdentifier=TC_PMS_SBI_List_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sbiExpiryStatus_expired, endPoint=/v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "expired", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiExpiryStatus as expired, uniqueIdentifier=TC_PMS_SBI_List_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sbiExpiryStatus_valid, endPoint=/v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "valid", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiExpiryStatus as vaild, uniqueIdentifier=TC_PMS_SBI_List_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sbiVersion_given, endPoint=/v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "abcd", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiVersion, uniqueIdentifier=TC_PMS_SBI_List_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sortType_ASC, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "sortType": "ASC", "pageNo": "0", "pageSize": "5", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with ASC, uniqueIdentifier=TC_PMS_SBI_List_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sortType_DESC, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "sortType": "DESC", "pageNo": "0", "pageSize": "5", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiVersion, uniqueIdentifier=TC_PMS_SBI_List_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_approved_sid, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as approved, uniqueIdentifier=TC_PMS_SBI_List_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_deactivated, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as deactivated, uniqueIdentifier=TC_PMS_SBI_List_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_pending_approval_sid, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as pending_approval, uniqueIdentifier=TC_PMS_SBI_List_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_rejected, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as rejected, uniqueIdentifier=TC_PMS_SBI_List_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "all" }], "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping Type parameter as All, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_InValid_Column_doesnt_exist, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "asrfg", "type": "all" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_InValid_Empty_column, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "", "type": "all" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must not be blank :request.filters[0].columnName" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_InValid_Empty_type, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322", "message": "Filter Type cannot be empty or null" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_InValid_type_doesnt_exist, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "asdfg" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324", "message": "Received Filter Type not supported" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "unique" }], "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping Type parameter as Unique, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapDeviceWithSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "device-id-123", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=MapDeviceWithSBI with valid details, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapDeviceWithSBI_Multiple_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "device-id-123", "sbiId": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=MapDevice Partner With Multiple SBI valid details, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapDeviceWithSBI_Multiple_MapDeviceWith_Diff_Provider, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "MOSIP.PROXY.SBI", "sbiId": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_AUT_005" } ] }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=MapDevice Partner With Multiple SBI with different Provider, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapDeviceWithSBI_Multiple_map, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "device-id-123", "sbiId": "$ID:SaveSecureBiometricInterface_TO_Map_Smoke_sid_id$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=MapDevice Partner With Multiple SBI, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RemoveMapDeviceWithSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map/remove, role=partner, templateFields=null, input={ "deviceDetailId": "device-id-123", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ "response": "Success" }, inputTemplate=pms/device/SecureBiometricInterface/RemoveMapDeviceWithSBI/removeMapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/RemoveMapDeviceWithSBI/removeMapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Remove Partner Mapped Device with SBI, uniqueIdentifier=TC_PMS_RemoveMapDeviceWithSBI_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output= { }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve Mapping Device To Sbi, uniqueIdentifier=TC_PMS_ApproveMappingDevice_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_ForDeactivate_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid_id$" }, output= { }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve Mapping Device To Sbi, uniqueIdentifier=TC_PMS_ApproveMappingDevice_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_different_deviceDetails_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "34242" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi with different deviceDetails, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_which_is_already_approved_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi by providing parameters which are already approved, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_DeviceID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$7372882$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi by providing invalid Device ID, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_Partner_Authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi with Invalid Partner Authentication, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "84838772", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi by providing invalid SBI ID, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_missing_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$REMOVE$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_024" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi while keeping SBI ID parameter as missing, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_random_DeviceProviderID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "deivce-sunny", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi with randome Device provider Id, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Partner_Authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Partner Authentication, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Req_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Request ID, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$REMOVE$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without requestTime, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without without sbiId value, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Version_value_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Version value, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_deviceProviderID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Device provider Id, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output= { }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbi, outputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject Mapping Device To Sbi, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbi_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_whichisRejected_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi by providing SBI which is Rejected and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbi_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSb_ReqID_Null_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "null", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping ReqID parameter as Null in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": " " }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping device ID as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Empty Partner ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_RequestTimeString_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": " ", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping RequestTime parameter as Empty string in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping RequestTime parameter as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Empty SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": " ", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "7281818", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Invalid SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as invalid value 0 in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as invalid value 1 in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValues_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "7288283", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as invalid values in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Missing_Req_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while passing Invalid RequestID parameter in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Missing_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as Missing in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Null_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "null", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as Null in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Provide_different_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:GetListOfAllSBI_partnerId_valid_sid_sbiId$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with different SBI ID and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_ReqID_Empty_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping ReqID parameter as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_ReqID_Invalid_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "7472828", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping ReqID parameter as Invalid in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_already_Rejected_mapped_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while providing already rejeceted device ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_different_format_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "1111-07-22T08:21:17.665Z", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping RequestTime value other than given format in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "812293" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while providing invalid device ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Device_IDvalues_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "8228828" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping device ID values in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "100223111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping invalid Partner ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_object_paramter_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "jadhav", "sbiId": "9329", "deviceDetailId": "93130" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with invalid object paramter in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_null_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "null" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping device ID as null in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_null_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "null", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping null Partner ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_null_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "null", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping null SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_random_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "731811993", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping random SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_with_Partner_Roles_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=device, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with Parter roles and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_with_different_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "233313" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with different device ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_without_Partner_Auth_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.reject.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi without Partner Authentication and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_without_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$REMOVE$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi without RequestTime parameter in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_without_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping without SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_whichisRejected_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve Mapping Device To Sbi when SBI is Rejected, uniqueIdentifier=TC_PMS_ApproveMappingDevice_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output= { "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998" }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbiResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Device List Mapped With Sbi, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedwithSbi_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "AJDJD9281" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all Device list which are mapped with SBI by provinding invalid SBI id in request, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_when_SBI_not_authenticated_device_provider_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "$ID:GetListOfAllSBI_partnerId_valid_sid_sbiId$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_019" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all Device list when SBI given is different from the authentiacted device provider, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_without_authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=invalidtoken, templateFields=null, input={ "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all Device list which are mapped with SBI without Authentication, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBI_PendingForApproval_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_Valid_ForDeactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_022" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI which is pending for approval, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnersPolicy_allValid_smoke, endPoint=/v1/policymanager/policies/{policyId}/partner/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "policyId": "mpolicy-default-auth", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupId": "mpolicygroup-default-auth", "policyGroupName": "mpolicygroup-default-auth", "policyId": "$IGNORE$", "policyName": "$IGNORE$", "status": "PUBLISHED" }, inputTemplate=pms/GetPartnersPolicy/getPartnersPolicy, outputTemplate=pms/GetPartnersPolicy/getPartnersPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy details, uniqueIdentifier=TC_PMS_GetPartnersPolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnersPolicy_invalid_partnerId, endPoint=/v1/policymanager/policies/{policyId}/partner/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "abcd", "policyId": "mpolicy-default-auth", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_017" } ] }, inputTemplate=pms/GetPartnersPolicy/getPartnersPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partners Policy details while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_GetPartnersPolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPolicyGroup_allValid_smoke, endPoint=/v1/policymanager/policies/group/all, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output={ } , inputTemplate=pms/GetAllPolicyGroup/getAllPolicyGroup, outputTemplate=pms/GetAllPolicyGroup/getAllPolicyGroupResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Partner Policy Group, uniqueIdentifier=TC_PMS_GetAllPolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_AllValid_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group with all valid details, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_Only_FilterCriteria_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Auth" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_Only_PaginationCriteria_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_Only_SortCriteria_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_columnname_id_asc_smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "contains", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "id", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping columnName parameter as id and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_columnname_id_desc_smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "contains", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping columnName parameter as id and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_contains_Smoke_asc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_contains_Smoke_desc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as contains and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_equals_Smoke_asc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "isActive": true }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as equals and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_equals_Smoke_desc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as equals and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_startswith_Smoke_asc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as startswith and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_startswith_Smoke_desc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as startswith and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_with_missing_columnName, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "startswith", "value": "Data Share" } ], "sort": [ { "sortField": "descr", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-311" } ] }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping columnName parameter as empty, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_Invalid_Column_doesnt_exist, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "sfg", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_PolicyGroupFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_Invalid_EmptyColumnName, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping ColumnName parameter as Empty, uniqueIdentifier=TC_PMS_PolicyGroupFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_Invalid_EmptyFilterType, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_PolicyGroupFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_Invalid_Type_doesnt_exist, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "sfgar", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_PolicyGroupFilter_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_all_Valid_Smoke, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "name", "fieldValue": "mpolicygroup-default-auth", "fieldCode": "mpolicygroup-default-auth" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner with valid values, uniqueIdentifier=TC_PMS_PolicyGroupFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_using_name_Valid_Smoke, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "unique", "text": "update_policy_group" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "name", "fieldValue": "update_policy_group", "fieldCode": "update_policy_group" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner using valid name, uniqueIdentifier=TC_PMS_PolicyGroupFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_using_name_with_columnname_Valid_Smoke, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "name", "fieldValue": "mpolicygroup-default-auth", "fieldCode": "mpolicygroup-default-auth" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping valid name for coulmnname parameter, uniqueIdentifier=TC_PMS_PolicyGroupFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetValueForConfigKey_allValid_smoke, endPoint=/v1/policymanager/policies/config/{key}, role=partner, templateFields=null, input={ "key": "abcd", "requesttime": "$TIMESTAMP$" }, output={ "key": "abcd", } , inputTemplate=pms/GetValueForConfigKey/getValueForConfigKey, outputTemplate=pms/GetValueForConfigKey/getValueForConfigKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve valid Value For Config Key keeping invalid Key, uniqueIdentifier=TC_PMS_GetValueForConfigKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asfgs", "type": "unique", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_PartnerFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_PartnerFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_Invalid_Empty_column, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_PartnerFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "asdg", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_PartnerFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_all_Valid_Smoke, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "all", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner-default-abis", "fieldCode": "mpartner-default-abis" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping Type parameter as All, uniqueIdentifier=TC_PMS_PartnerFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_unique_Valid_Smoke, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner-default-abis", "fieldCode": "mpartner-default-abis" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping Type parameter as Unique, uniqueIdentifier=TC_PMS_PartnerFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_AllValid_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key with valid data, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "unique", "value": "mpolicy_part_auth_api" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key with Only FilterCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_Only_Pagination_Criteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key with Only PaginationCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "isActive", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key with Only SortCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_type_contains_Smoke_asc_sid, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "unique", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "isActive", "sortType": "asc" } ], "pageFetch": "1", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_columnName, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "abcd", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "policyApiKey", "sortType": "asc" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key while keeping Type parameter as contains and invalid columnName, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_pagination, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "policyApiKey", "sortType": "asc" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key while keeping Type parameter as contains and invalid pagination, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_sortField, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "abcd", "sortType": "asc" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key while keeping Type parameter as contains and invalid sortField, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_sortType, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "policyApiKey", "sortType": "abcd" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key while keeping Type parameter as contains and invalid sortType, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_AllValid_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key with valid data, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "unique", "value": "mpartner_policy_auth_req" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key with Only FilterCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key with Only PaginationCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key with Only SortCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_type_contains_Smoke_asc_sid, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "unique", "value": "mpartner_policy_auth_req" } ], "sort": "$IGNORE$", "pageFetch": "1", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_type_contains_invalid_pagination, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "unique", "value": "mpartner_policy_auth_req" } ], "sort": "$IGNORE$", "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key while keeping Type parameter as contains and invalid pagination, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "all", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner_policy_auth_req", "fieldCode": "mpartner_policy_auth_req" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner with valid values, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asdf", "type": "unique", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "sfga", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_Valid_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner_policy_auth_req", "fieldCode": "mpartner_policy_auth_req" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner with valid values, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_AllValid_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type with all valid data, uniqueIdentifier=TC_PMS_createSearchPartnerType_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "contains", "value": "Device_Provider" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchPartnerType_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchPartnerType_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchPartnerType_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_contains_Smoke_asc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "contains", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type with valid data, uniqueIdentifier=TC_PMS_createSearchPartnerType_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_contains_Smoke_desc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "contains", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as contains and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPartnerType_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_equals_Smoke_asc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPartnerType_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_equals_Smoke_desc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as equals and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPartnerType_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_startswith_Smoke_asc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as startswith and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPartnerType_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_startswith_Smoke_desc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as startswith and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPartnerType_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_invalid_columnName, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "co@@@@@343455666###4$$%%de", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping columnName parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartnerType_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_invalid_sort_field, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "mo@@@del" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping sortField parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartnerType_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_invalid_sort_type, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "dc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping sortType parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartnerType_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_invalid_value_equals, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "a@@@334455667788s" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Value parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartnerType_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_invalid_value_startswith, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "a@@@334455667788s" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping value parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartnerType_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_missing_columnName, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-311" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping columnName parameter as empty, uniqueIdentifier=TC_PMS_createSearchPartnerType_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_missing_sort_field, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "$REMOVE$", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping sortField parameter as empty, uniqueIdentifier=TC_PMS_createSearchPartnerType_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_missing_sort_type, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping sortType parameter as empty, uniqueIdentifier=TC_PMS_createSearchPartnerType_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_missing_type, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "$REMOVE$", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as empty, uniqueIdentifier=TC_PMS_createSearchPartnerType_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_All_Approved_Ftm_Provider_AllValid_Smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=FTM_Provider, role=partnerftm, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_CA_Cert_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderBeforeUploadingCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers before uploading CA certificates, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_Partner_Cert_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderBeforeUploadingCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers before uploading Partner certificate, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers with Invalid access token, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Without_Authentication_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers without Partner authentication, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_Invalid_Token_Neg, endPoint=/v1/partnermanager/ftpchipdetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details with Invalid access token, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_WhenNo_FTM_Chips_AddedNeg, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/GetListAllFTMChip/GetListAllFTMChipResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details when FTM Chips are not added for Partner, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_Without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerdevice, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details wwith Device Partner token, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_CreateFTPChipDetail_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ "ftpProviderId": "pms-111888", "make": "Make123", "model": "MODEL-01", "requesttime": "$TIMESTAMP$" }, output={ "id": "$IGNORE$" }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create FTP Chip Deatils for Partner, uniqueIdentifier=TC_PMS_CreateFTPChipDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateFTPChipDetail_Missing_InputParameter_ftpId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpProviderId": "$REMOVE$", "make": "Make123", "model": "MODEL-01", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create FTP Chip Deatils for Partner while keeping ftpId parameter as missing, uniqueIdentifier=TC_PMS_CreateFTPChipDetail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateFTPChipDetail_Missing_InputParameter_ftpProviderId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpProviderId": "FTP-AUTOMATION", "make": "$REMOVE$", "model": "MODEL-01", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create FTP Chip Deatils for Partner while keeping ftpProviderId parameter as missing, uniqueIdentifier=TC_PMS_CreateFTPChipDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ "ftpProviderId": "pms-111888", "make": "AcmeCorpFtm", "model": "mode2" }, output={ }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Ftm Chip Details, uniqueIdentifier=TC_PMS_createFtmChipDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateFtpChipDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpChipDetailId": "$ID:CreateFTPChipDetail_All_Valid_Smoke_sid_id$", "make": "Make123Updated", "model": "MODEL-001", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/UpdateFtpChipDetail/updateFtpChipDetail, outputTemplate=pms/device/ftmChipDetails/update/updateFtpChipDetailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update FTP Chip detail for Partner with valid details, uniqueIdentifier=TC_PMS_UpdateFtpChipDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateFtpChipDetail_Missing_InputParameter_ftpChipDetailId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpChipDetailId": "$REMOVE$", "make": "Make123", "model": "MODEL-001", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdateFtpChipDetail/updateFtpChipDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update FTP Chip detail for Partner while keeping ftpChipDetailId parameter as missing, uniqueIdentifier=TC_PMS_UpdateFtpChipDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_Before_Uploading_Partner_Cert_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_011" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte with valid Partner ID, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacte_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_whichisPendingforCertUpload_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_010" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM which is Pending for Approval, uniqueIdentifier=TC_PMS_DeactivateFtm_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_forPendingforCertUpload_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_011" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte for Pending for Certificate Upload, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificate_AllValid_smoke_ftpProviderId, endPoint=/v1/partnermanager/ftpchipdetail/uploadcertificate, role=partnerftm, templateFields=null, input={ "requesttime":"$TIMESTAMP$", "ftpProviderId": "pms-111888", "ftpChipDeatilId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$", "isItForRegistrationDevice": true, "organizationName": "PMS_API_ABC_ORG", "partnerDomain": "DEVICE" }, output= { }, inputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChip, outputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChipResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload FTP chip Certificate, uniqueIdentifier=TC_PMS_UploadCertificateOfFtpChip_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificate_InValid_ftpChipId_neg, endPoint=/v1/partnermanager/ftpchipdetail/uploadcertificate, role=partner, templateFields=null, input={ "ftpProviderId": "pms-111888", "ftpChipDeatilId": "asdf", "isItForRegistrationDevice": true, "organizationName": "PMS_API_ABC_ORG", "partnerDomain": "DEVICE" }, output= { "errors": [ { "errorCode": "PMP_AUT_031" } ] }, inputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChip, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Certificate for FTP chip provider Partner while keeping ftpChipId parameter as invalid, uniqueIdentifier=TC_PMS_UploadCertificateOfFtpChip_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificate_InValid_ftpProviderId_neg, endPoint=/v1/partnermanager/ftpchipdetail/uploadcertificate, role=partner, templateFields=null, input={ "ftpProviderId": "asdgfb", "ftpChipDeatilId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$", "isItForRegistrationDevice": true, "organizationName": "ftp", "partnerDomain": "DEVICE" }, output= { "errors": [ { "errorCode": "PMP_AUT_030" } ] }, inputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChip, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Certificate for FTP chip provider Partner while keeping ftpProviderId parameter as invalid, uniqueIdentifier=TC_PMS_UploadCertificateOfFtpChip_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_whichisPendingforApproval_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_010" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM which is Pending for Approval, uniqueIdentifier=TC_PMS_DeactivateFtm_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveFTMChipDetail_allValid_smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partneradmin, templateFields=null, input={ "ftpChipDetailId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$", "approvalStatus": true }, output={ }, inputTemplate=pms/ApproveFTMChipDetail/ApproveFTMChipDetail, outputTemplate=pms/ApproveFTMChipDetail/ApproveFTMChipDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve FTM Chip Detail, uniqueIdentifier=TC_PMS_ApproveFTMchipDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveFtpChipDetail_Missing_InputParameter_ftpChipDetailId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "approvalStatus": true, "ftpChipDetailId": "$REMOVE$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ApproveFTMChipDetail/ApproveFTMChipDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update FTM Chip provider Partner while keeping ftpChipDetailID as missing, uniqueIdentifier=TC_PMS_ApproveFtpChipDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_rejectFtpChipDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "approvalStatus": false, "ftpChipDetailId": "$ID:CreateFTPChipDetail_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/RejectFtpChipDetail/rejectFtpChipDetail, outputTemplate=pms/RejectFtpChipDetail/rejectFtpChipDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject FTP Chip detail for Partner, uniqueIdentifier=TC_PMS_rejectFtpChipDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_rejectFtpChipDetail_Missing_InputParameter_ftpChipDetailId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "approvalStatus": true, "ftpChipDetailId": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/RejectFtpChipDetail/rejectFtpChipDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject FTP Chip detail for Partner while keeping ftpChipDetailId paramter as missing, uniqueIdentifier=TC_PMS_rejectFtpChipDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetFtpChipDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail/getPartnerCertificate/{ftpChipDetailId}, role=partner, templateFields=null, input={ "ftpChipDetailId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/GetFtpChipDetail/getFtpChipDetail, outputTemplate=pms/GetFtpChipDetail/getFtpChipDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive FTP ChipDetails Partner with valid detail, uniqueIdentifier=TC_PMS_GetFTPChipDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ }, output= { "partnerId": "pms-111888", "make": "AcmeCorpFtm", "model": "mode2 }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/GetListAllFTMChip/GetListAllFTMChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details with valid details, uniqueIdentifier=TC_PMS_GetListAllFTMChip_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_allValid_smoke, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte with valid Partner ID, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacte_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_Invalid_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "0191230330" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_Invalid_Value_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "fsadf" }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_SpaceVla_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": " " }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte while keeping FTM ID parameter as Missing and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_with_Invalid_AccessToken_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=invalidtoken, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte with invalid partner access token and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=invalidtoken, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte without partner Authentication and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail, uniqueIdentifier=TC_PMS_FTM_chip_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_make_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?make={make}, role=partneradmin, templateFields=null, input={ "make": "abcd", "pageSize": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for make value contains 'abcd', uniqueIdentifier=TC_PMS_FTM_chip_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_model_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?model={model}, role=partneradmin, templateFields=null, input={ "model": "xyz", "make": "$REMOVE$", "pageSize": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for model value contains 'xyz', uniqueIdentifier=TC_PMS_FTM_chip_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_orgName_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?orgName={orgName}, role=partneradmin, templateFields=null, input={ "orgName": "1", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for orgName which contains '1', uniqueIdentifier=TC_PMS_FTM_chip_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_pagesize_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "5", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for pageSize specified, uniqueIdentifier=TC_PMS_FTM_chip_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_partnerId_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "a", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for partnerId which contains 'a', uniqueIdentifier=TC_PMS_FTM_chip_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_random_value_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "16263gdvddgdv", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by giving random value for partnerId, uniqueIdentifier=TC_PMS_FTM_chip_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_sortType_ASC, endPoint=/v1/partnermanager/ftpchipdetail/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "ASC", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by sort type ASC for the given sort field, uniqueIdentifier=TC_PMS_FTM_chip_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_sortType_DESC, endPoint=/v1/partnermanager/ftpchipdetail/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "DESC", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by sort type DESC for the given sort field, uniqueIdentifier=TC_PMS_FTM_chip_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_approved, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as approved, uniqueIdentifier=TC_PMS_FTM_chip_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_deactivated, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as deactivated, uniqueIdentifier=TC_PMS_FTM_chip_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_pending_approval, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as pending_approval, uniqueIdentifier=TC_PMS_FTM_chip_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_pending_cert_upload, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_cert_upload", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as pending_cert_upload, uniqueIdentifier=TC_PMS_FTM_chip_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_rejected, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as rejected, uniqueIdentifier=TC_PMS_FTM_chip_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_with_combination_search_twofields, endPoint=/v1/partnermanager/ftpchipdetail/v2?make={make}&model={model}, role=partneradmin, templateFields=null, input={ "make": "1", "model": "2", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by giving value for both make and model, uniqueIdentifier=TC_PMS_FTM_chip_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_Negative_pageNo_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "pageNo": "-6", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with negative pageNo, uniqueIdentifier=TC_PMS_FTM_chip_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_Negative_pagesize_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "pageSize": "-6", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with negative pagesize, uniqueIdentifier=TC_PMS_FTM_chip_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_invalid_sortType_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "sortType": "$%$^&&", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with invalid sortType, uniqueIdentifier=TC_PMS_FTM_chip_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_invalid_sortfield_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "sortFieldName": "$%$^&&", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with invalid sortfieldname, uniqueIdentifier=TC_PMS_FTM_chip_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_invalid_token_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with invalid token, uniqueIdentifier=TC_PMS_FTM_chip_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail without authentication, uniqueIdentifier=TC_PMS_FTM_chip_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Invalid_orgName_Neg, endPoint=/v1/partnermanager/securebiometricinterface?orgName={orgName}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "*PMS", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI with invalid orgName, uniqueIdentifier=TC_PMS_SBI_List_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Invalid_sbiID_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sbiId={sbiId}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "*12*", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI with invalid sbiID, uniqueIdentifier=TC_PMS_SBI_List_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Invalid_sbiVersion_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "*PMS", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI with invalid sbiVersion, uniqueIdentifier=TC_PMS_SBI_List_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Only_sortFieldName_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "partnerId", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI by selecting only sortFieldName without selecting sortType and sortFieldName, uniqueIdentifier=TC_PMS_SBI_List_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Only_sortType_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "asc", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI by selecting only sortType without selecting sortFieldName, uniqueIdentifier=TC_PMS_SBI_List_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_SBI_Version_Special_Character_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "@#", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { "totalResults": "0" }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBITotalResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI Version with passing Special Character, uniqueIdentifier=TC_PMS_SBI_List_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_partnerId_Neg, endPoint=/v1/partnermanager/securebiometricinterface?partnerId={partnerId}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "*11", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with negative pageNo value, uniqueIdentifier=TC_PMS_SBI_List_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}&sortType={sortType}&pageNo={pageNo}&pageSize={pageSize}, role=partnerdevice, templateFields=null, input={ "pageNo": "0", "pageSize": "4", "sortType": "asc", "sortFieldName": "partner", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with invalid sortFieldName, uniqueIdentifier=TC_PMS_SBI_List_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_sortType_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}, role=partnerdevice, templateFields=null, input={ "sortType": "$%$^&&", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with invalid sortType, uniqueIdentifier=TC_PMS_SBI_List_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_sortfield_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}, role=partnerdevice, templateFields=null, input={ "sortFieldName": "$%$^&&", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with invalid sortfield, uniqueIdentifier=TC_PMS_SBI_List_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_token_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with invalid token, uniqueIdentifier=TC_PMS_SBI_List_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_negative_pageNo_Neg, endPoint=/v1/partnermanager/securebiometricinterface?pageNo={pageNo}, role=partnerdevice, templateFields=null, input={ "pageNo": "-7", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with negative pageNo value, uniqueIdentifier=TC_PMS_SBI_List_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_negative_pageSize_Neg, endPoint=/v1/partnermanager/securebiometricinterface?pageSize={pageSize}, role=partnerdevice, templateFields=null, input={ "pageSize": "-7", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with negative pagesize value, uniqueIdentifier=TC_PMS_SBI_List_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_without_Authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI without Authentication, uniqueIdentifier=TC_PMS_SBI_List_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices, uniqueIdentifier=TC_PMS_devicedetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceId_given, endPoint=/v1/partnermanager/devicedetail?deviceId={deviceId}, role=partneradmin, templateFields=null, input={ "deviceId": "9", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with deviceId given as '9', uniqueIdentifier=TC_PMS_devicedetails_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceId_random_value_given, endPoint=/v1/partnermanager/devicedetail?deviceId={deviceId}, role=partneradmin, templateFields=null, input={ "deviceId": "d", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with random value given for deviceid, uniqueIdentifier=TC_PMS_devicedetails_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceSubType_given, endPoint=/v1/partnermanager/devicedetail?deviceSubType={deviceSubType}, role=partneradmin, templateFields=null, input={ "deviceSubType": "f", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with deviceSubType given as 'i', uniqueIdentifier=TC_PMS_devicedetails_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceType_given, endPoint=/v1/partnermanager/devicedetail?deviceType={deviceType}, role=partneradmin, templateFields=null, input={ "deviceType": "i", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with deviceType given as 'i', uniqueIdentifier=TC_PMS_devicedetails_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_invalid_sortfield_Neg, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$$$$$$", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortType": "DESC", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with invalid sortFieldName, uniqueIdentifier=TC_PMS_devicedetails_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_invalid_sorttype, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortType": "device", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "make", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with invalid sorttype, uniqueIdentifier=TC_PMS_devicedetails_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_invalid_token, endPoint=/v1/partnermanager/devicedetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with invalid token, uniqueIdentifier=TC_PMS_devicedetails_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_make_given, endPoint=/v1/partnermanager/devicedetail?make={make}, role=partneradmin, templateFields=null, input={ "make": "3", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with make given as '3', uniqueIdentifier=TC_PMS_devicedetails_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_model_given, endPoint=/v1/partnermanager/devicedetail?model={model}, role=partneradmin, templateFields=null, input={ "model": "4", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with model given as '4', uniqueIdentifier=TC_PMS_devicedetails_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_multiple_attribute_values_given, endPoint=/v1/partnermanager/devicedetail?make={make}&model={model}, role=partneradmin, templateFields=null, input={ "make": "1", "model": "1", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with make and model is given, uniqueIdentifier=TC_PMS_devicedetails_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_negative_pageno, endPoint=/v1/partnermanager/devicedetail?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "pageNo": "-5", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with negative pageno, uniqueIdentifier=TC_PMS_devicedetails_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_negative_pagesize, endPoint=/v1/partnermanager/devicedetail?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "-5", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with negative pageSize, uniqueIdentifier=TC_PMS_devicedetails_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sbiId_given, endPoint=/v1/partnermanager/devicedetail?sbiId={sbiId}, role=partneradmin, templateFields=null, input={ "sbiId": "q", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sbiId given as 'q', uniqueIdentifier=TC_PMS_devicedetails_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sbiversion_given, endPoint=/v1/partnermanager/devicedetail?sbiVersion={sbiVersion}, role=partneradmin, templateFields=null, input={ "sbiVersion": "abcd", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sbiVersion given as 'abcd', uniqueIdentifier=TC_PMS_devicedetails_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sorttype_asc, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "asc", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sorttype as 'asc', uniqueIdentifier=TC_PMS_devicedetails_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sorttype_desc, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortType": "desc", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sorttype as 'desc', uniqueIdentifier=TC_PMS_devicedetails_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_orgName, endPoint=/v1/partnermanager/devicedetail?orgName={orgName}, role=partneradmin, templateFields=null, input={ "orgName": "1", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with orgName value given as '1', uniqueIdentifier=TC_PMS_devicedetails_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_pagesize_specified, endPoint=/v1/partnermanager/devicedetail?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "7", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with pagesize specified, uniqueIdentifier=TC_PMS_devicedetails_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_partnerid, endPoint=/v1/partnermanager/devicedetail?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "a", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with partnerid value given as 'a', uniqueIdentifier=TC_PMS_devicedetails_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_approved, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as approved, uniqueIdentifier=TC_PMS_devicedetails_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_deactivated, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as deactivated, uniqueIdentifier=TC_PMS_devicedetails_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_pending_approval, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as pending_approval, uniqueIdentifier=TC_PMS_devicedetails_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_rejected, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as rejected, uniqueIdentifier=TC_PMS_devicedetails_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_without_Authentication, endPoint=/v1/partnermanager/devicedetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices without authentication, uniqueIdentifier=TC_PMS_devicedetails_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetCountOfFtm_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetCountOfFtm/getCountOfFtm, outputTemplate=pms/GetCountOfFtm/getCountOfFtmResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all active FTM, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllSystemConfigs_All_Valid_Smoke, endPoint=/v1/partnermanager/system-config, role=patneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the configuration for PMS, uniqueIdentifier=TC_PMS_GetAllSystemConfigs_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllSystemConfigs_without_authentication_Neg, endPoint=/v1/partnermanager/system-config, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the configuration for PMS without authentication, uniqueIdentifier=TC_PMS_GetAllSystemConfigs_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRootCertificate_allValid_smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ }, output={ "caCertificateType": "ROOT" }, inputTemplate=pms/GetAllRootCertificate/getAllRootCertificate, outputTemplate=pms/GetAllRootCertificate/getAllRootCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the root certificates of the Logged in Partner, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Keys, uniqueIdentifier=TC_PMS_GetListOfApiKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_individual_partner_Neg, endPoint=/v1/partnermanager/partner-api-keys?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "pageSize": "$REMOVE$", "partnerId": "pms-111998", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfAllDeviceResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with individual partner, uniqueIdentifier=TC_PMS_GetListOfApiKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_invalid_pageSize, endPoint=/v1/partnermanager/partner-api-keys?pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageSize": "-5", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with pageSize, uniqueIdentifier=TC_PMS_GetListOfApiKey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_invalid_sortType_Neg, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}, role=partnerauth, templateFields=null, input={ "sortType": "cas", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with invalid sortType, uniqueIdentifier=TC_PMS_GetListOfApiKey_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_negative_pageNo_Neg, endPoint=/v1/partnermanager/partner-api-keys?pageNo={pageNo}, role=partnerauth, templateFields=null, input={ "pageNo": "-1", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with negative pageNo, uniqueIdentifier=TC_PMS_GetListOfApiKey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_negative_pageSize_Neg, endPoint=/v1/partnermanager/partner-api-keys?pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageSize": "-5", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with negative pageSize, uniqueIdentifier=TC_PMS_GetListOfApiKey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_apiKeyLabel_value, endPoint=/v1/partnermanager/partner-api-keys?apiKeyLabel={apiKeyLabel}, role=partnerauth, templateFields=null, input={ "apiKeyLabel": "tyy1", "policyName": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with partial apiKeyLabel values, uniqueIdentifier=TC_PMS_GetListOfApiKey_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_orgName_value, endPoint=/v1/partnermanager/partner-api-keys?orgName={orgName}, role=partnerauth, templateFields=null, input={ "orgName": "sp", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with partial orgName value, uniqueIdentifier=TC_PMS_GetListOfApiKey_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_partnerId_value, endPoint=/v1/partnermanager/partner-api-keys?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "A", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys on passing partial partnerId value, uniqueIdentifier=TC_PMS_GetListOfApiKey_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_policyGroupName_value, endPoint=/v1/partnermanager/partner-api-keys?policyGroupName={policyGroupName}, role=partnerauth, templateFields=null, input={ "policyGroupName": "1", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys on passing partial policyGroupName value, uniqueIdentifier=TC_PMS_GetListOfApiKey_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_policyName_value, endPoint=/v1/partnermanager/partner-api-keys?policyName={policyName}, role=partnerauth, templateFields=null, input={ "policyName": "pqr", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with partial policyName values, uniqueIdentifier=TC_PMS_GetListOfApiKey_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_random_data, endPoint=/v1/partnermanager/partner-api-keys?orgName={orgName}, role=partnerauth, templateFields=null, input={ "orgName": "zz6762j", "apiKeyLabel": "$REMOVE$", "policyName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with random values given to a valid parameter, uniqueIdentifier=TC_PMS_GetListOfApiKey_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_status_activated, endPoint=/v1/partnermanager/partner-api-keys?status={status}, role=partnerauth, templateFields=null, input={ "status": "activated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with status activated, uniqueIdentifier=TC_PMS_GetListOfApiKey_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_status_deactivated, endPoint=/v1/partnermanager/partner-api-keys?status={status}, role=partnerauth, templateFields=null, input={ "status": "deactivated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with status deactivated, uniqueIdentifier=TC_PMS_GetListOfApiKey_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_valid_ascending_sortType, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=partnerId&pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "sortType": "ASC", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "10", "pageNo": "0", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with ascending sortType, uniqueIdentifier=TC_PMS_GetListOfApiKey_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_valid_descending_sortType, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=orgName&pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "sortType": "DESC", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "10", "pageNo": "0", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with ascending sortType, uniqueIdentifier=TC_PMS_GetListOfApiKey_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_without_authentication_Neg, endPoint=/v1/partnermanager/partner-api-keys, role=invalidtoken, templateFields=null, input={ }, output= { "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys without authentication, uniqueIdentifier=TC_PMS_GetListOfApiKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DownloadRootCertificate_allValid_smoke, endPoint=/v1/partnermanager/trust-chain-certificates/{certificateId}/certificateFile, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/DownloadRootCertificate/downloadRootCertificate, outputTemplate=pms/DownloadRootCertificate/downloadRootCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the root certificates of the Logged in Partner, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicense_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "partnerId": "pms-111555", "licenseKeyStatus": "ACTIVE" }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicense_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicense_All_Valid_Smoke_without_PolicyID_sid, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111557", "policyId": "$REMOVE$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "partnerId": "pms-111557", "licenseKeyStatus": "ACTIVE" }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License without PolicyID and user should be able to generate the license, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicense_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Already_registered_LicenseKeyName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "expiryDate": "2025-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_424" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License with already registered licenseKeyName, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_LicenseKeyName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": " ", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_422" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License with Empty licenseKeyName, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_RequestID, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": " ", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License Empty request ID, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_expiryDate, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": " " }, output={ "errors": [ { "errorCode": "PMS_MSP_436" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License with Empty expiryDate, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_partnerId, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": " ", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_423" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License with Empty partnerId, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Invalid_RequestID, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License with invalid request ID, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Invalid_Version, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "10", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License invalid version, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Invalid_partnerId, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pmsapiautomation123456", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_429" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License with invalid partnerId, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Null_RequestID, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "null", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License Null request ID, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Null_Version, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "null", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License without version, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Past_expiryDate, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2025-10-08" }, output={ "errors": [ { "errorCode": "PMS_MSP_425" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License with Past expiryDate, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Version_value0, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License version value 0, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Version_value1, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License version value 1, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_invalid_LicenseKeyName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "&^%$$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License with invalid licenseKeyName, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_null_partnerId, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "null", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_429" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License with null partnerId, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_past_requestTime, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "2024-10-09T11:33:18.573Z", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License with past request time, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_Access_Token, endPoint=/v1/partnermanager/misp-licenses, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License without access Token, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_RequestID, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License without request ID, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_Version, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License without version, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_requestTime, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$REMOVE$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate MISP Partner License with past request time, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/misp-licenses?pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner license using a valid access token, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_ByValidPartnerId, endPoint=/v1/partnermanager/misp-licenses?partnerId=pms-111555, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner license using a valid partnerId, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_with_Default_Pagination, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner license using default pagination settings, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_with_MispLicenseKeyName, endPoint=/v1/partnermanager/misp-licenses?mispLicenseKeyName=License_A, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner license using a valid MispLicenseKeyName, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_with_Nofilter_Valid_Smoke, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all MISP license keys without passing any query parameters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_with_ORGName, endPoint=/v1/partnermanager/misp-licenses?orgName=ORGName, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner license using a valid OrgName, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_with_Pagination, endPoint=/v1/partnermanager/misp-licenses?pageNo=0&pageSize=2, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner license using pagination with 2 records per page, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_with_PolicyGroupName, endPoint=/v1/partnermanager/misp-licenses?policyGroupName=Group_A, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner license using a valid PolicyGroupName, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_with_PolicyName, endPoint=/v1/partnermanager/misp-licenses?policyName=Policy_X, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner license using a valid PolicyName, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_with_SortField_And_Ascending_Order, endPoint=/v1/partnermanager/misp-licenses?sortFieldName=mispLicenseKeyName&sortType=asc, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner licenses sorted by mispLicenseKeyName in ascending order, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_with_SortField_And_Descending_Order, endPoint=/v1/partnermanager/misp-licenses?sortFieldName=mispLicenseKeyName&sortType=desc, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner licenses sorted by mispLicenseKeyName in descending order, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_with_Status_Activated, endPoint=/v1/partnermanager/misp-licenses?status=ACTIVE, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner license with status set to ACTIVE, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicense_with_Status_Deactived, endPoint=/v1/partnermanager/misp-licenses?status=deactivated, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch MISP partner license with status set to DEACTIVATED, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Empty_String_PolicyGroupName_Neg, endPoint=/v1/partnermanager/misp-licenses?policyGroupName="", role=partneradmin, templateFields=null, input={}, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License when PolicyGroupName is Empty, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Empty_String_PolicyName_Neg, endPoint=/v1/partnermanager/misp-licenses?policyName="", role=partneradmin, templateFields=null, input={}, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License when PolicyName is Empty, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_MispLicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses?mispLicenseKeyName=INVALID_KEY, role=partneradmin, templateFields=null, input={}, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Invalid MispLicenseKeyName, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_OrgName_Neg, endPoint=/v1/partnermanager/misp-licenses?orgName=UnknownOrg, role=partneradmin, templateFields=null, input={}, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Invalid OrgName, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PageNo_Format_Neg, endPoint=/v1/partnermanager/misp-licenses?pageNo=abc&pageSize=2, role=partneradmin, templateFields=null, input={}, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Invalid format of PageNo, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PageNo_Neg, endPoint=/v1/partnermanager/misp-licenses?pageNo=10089&pageSize=0, role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Invalid PageNo, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PageSize_Format_Neg, endPoint=/v1/partnermanager/misp-licenses?pageNo=0&pageSize=abc, role=partneradmin, templateFields=null, input={}, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Invalid format of PageSize, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses?partnerId=invalid_partnerid, role=partneradmin, templateFields=null, input={}, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Invalid PartnerId, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PolicyGroupName_Neg, endPoint=/v1/partnermanager/misp-licenses?policyGroupName=Invalid_policygroupname, role=partneradmin, templateFields=null, input={}, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Invalid PolicyGroupName, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PolicyName_Neg, endPoint=/v1/partnermanager/misp-licenses?policyName=Invalid_Policy, role=partneradmin, templateFields=null, input={}, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Invalid PolicyName, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Negative_PageNo_Neg, endPoint=/v1/partnermanager/misp-licenses?pageNo=-1&pageSize=8, role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Negative PageNo, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Negative_PageSize_Neg, endPoint=/v1/partnermanager/misp-licenses?pageSize=-5, role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Negative PageSize, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_SortFieldName_and_Invalid_SortType_Neg, endPoint=/v1/partnermanager/misp-licenses?sortFieldName=mispLicenseKeyName&sortType=random, role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License when SortFieldName is used with an invalid SortType, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_SortType_Without_SortFieldName_Neg, endPoint=/v1/partnermanager/misp-licenses?sortType=asc, role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License when SortType is provided without SortFieldName, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_MispLicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses?mispLicenseKeyName=Key@@!!$$., role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License using MispLicenseKeyName with special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_OrgName_Neg, endPoint=/v1/partnermanager/misp-licenses?orgName=Org@@!!$$., role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License using OrgName when OrgName has special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses?orgName=Par@@!!$$., role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License using OrgName when PartnerId has special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_PolicyGroupName_Neg, endPoint=/v1/partnermanager/misp-licenses?policyName=Gr@Up@!!$$., role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License using PolicyName when PolicyGroupName has special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_PolicyName_Neg, endPoint=/v1/partnermanager/misp-licenses?policyName=P@!!cY$$., role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License using PolicyName when PolicyName has special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_SortFieldName_Neg, endPoint=/v1/partnermanager/misp-licenses?sortFieldName=@#$%, role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License using when SortFieldName has special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Valid_OrgName_and_Invalid_PolicyGroupName_Neg, endPoint=/v1/partnermanager/misp-licenses?orgName=Org_A&policyGroupName=InvalidGroup123, role=partneradmin, templateFields=null, input={}, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Valid OrgName and Invalid PolicyGroupName, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Zero_PageSize_Neg, endPoint=/v1/partnermanager/misp-licenses?pageSize=0, role=partneradmin, templateFields=null, input={}, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License with Zero PageSize, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_without_Access_Token_Neg, endPoint=/v1/partnermanager/misp-licenses?pageNo=0&pageSize=8, role=invalidtoken, templateFields=null, input={}, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP Partner License without Access Token, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerId_All_Valid_Smoke, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerIdResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP partner license details by Partner ID using a valid access token, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerId_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_Auth_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111999", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP partner license details by using Auth Partner ID, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_DiffOrg_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111998", "licenseKeyName": "$REMOVE$", "policyId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP partner license details using Different organisation Partner ID, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_Invalid_Access_Token_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=invalidtoken, templateFields=null, input={ "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP partner license details by Partner ID using invalid access token, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_Invalid_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "@@invalid-partnerId", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_429" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP partner license details by Partner ID using invalid PartnerId, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_NotRegistered_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-222222", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_429" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP partner license details using Not Registered Partner ID, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_NotUploaded_Certificate_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111444", "licenseKeyName": "$REMOVE$", "policyId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_MSP_429" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP partner license details using Not uploaded certificate Partner ID, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_PartnerId_And_Without_LicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111556", "licenseKeyName": "", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP partner license details by Partner ID without LicenseKeyName, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_PartnerId_Null_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "null", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_429" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching MISP partner license details by giving Partner ID is null, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Blank_SortField, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with Empty Sort Field, uniqueIdentifier=TC_PMS_SearchMispLicense_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Invalid_NegPageFetch, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": -1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with invalid Page fetch, uniqueIdentifier=TC_PMS_SearchMispLicense_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Invalid_NegPageStart, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": -1, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with invalid Page Start, uniqueIdentifier=TC_PMS_SearchMispLicense_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Invalid_SortField_neg, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createddDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with invalid SortField, uniqueIdentifier=TC_PMS_SearchMispLicense_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Invalid_SortType_neg, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "asdf" }], "pageStart": 0, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with invalid SortType, uniqueIdentifier=TC_PMS_SearchMispLicense_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Valid_Filter_Name, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 10, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with valid Filter Name, uniqueIdentifier=TC_PMS_SearchMispLicense_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Valid_Smoke, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 10, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with valid details, uniqueIdentifier=TC_PMS_SearchMispLicense_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "all", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "isActive", "fieldValue": "true" }, { "fieldID": "isActive", "fieldValue": "false" } ], "errors": null }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping Type All, uniqueIdentifier=TC_PMS_FilterMispLicense_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_Blank_FilterType, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping Type parameter as Empty, uniqueIdentifier=TC_PMS_FilterMispLicense_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_InValid_Empty_columnName, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping ColumnName parameter as Empty, uniqueIdentifier=TC_PMS_FilterMispLicense_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_InValid_FilterType, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "iSActive", "type": "between", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping Text parameter as Empty, uniqueIdentifier=TC_PMS_FilterMispLicense_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_InValid_columnName, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "lang_code", "type": "unique", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping ColumnName parameter as Invalid, uniqueIdentifier=TC_PMS_FilterMispLicense_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_Valid_Smoke, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "unique", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "isActive", "fieldValue": "true" }, { "fieldID": "isActive", "fieldValue": "false" } ], "errors": null }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping Type Unique, uniqueIdentifier=TC_PMS_FilterMispLicense_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerApiKeyRequest_InValid_partnerId_neg, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/request, role=partner, templateFields=null, input={ "partnerId": "fqgfg" }, output={ "errors": [ { "errorCode": "PMS_PRT_006" } ] }, inputTemplate=pms/GetPartnerApiKeyRequest/getPartnerApiKeyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve ApiKeyRequests for Partner while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_GetPartnerApiKeyRequest_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetBioExtractors_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "afgebv", "policyId": "mpolicy-default-auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_064", "message": "No details found" } ] }, inputTemplate=pms/GetBioExtractors/getBioExtractors, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Bio Extractors for Partner while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_GetBioExtractors_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetBioExtractors_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "policyId": "mpolicy-default-auth" }, output={ }, inputTemplate=pms/GetBioExtractors/getBioExtractors, outputTemplate=pms/GetBioExtractors/getBioExtractorsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Bio Extractors for Partner, uniqueIdentifier=TC_PMS_GetBioExtractors_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateBioExtractors_InValid_PolicyId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "policyId": "vdsfhfx", "attributeName": "iris", "biometric": "iris", "provider": "mock", "version": "1.1", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/CreateBioExtractors/createBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create BioExtractors for Partner with invalid PolicyID, uniqueIdentifier=TC_PMS_CreateBioExtractors_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateBioExtractors_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "asvgasfbkasdm", "policyId": "mpolicy-default-auth", "attributeName": "iris", "biometric": "iris", "provider": "mock", "version": "1.1", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/CreateBioExtractors/createBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create BioExtractors for Partner with invalid PartnerID, uniqueIdentifier=TC_PMS_CreateBioExtractors_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_AllValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111999", "credentialType": "auth", "policyId": "mosip policy" }, output={ }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_InValid_credentialType, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "credentialType": "sfdgsaefhb", "policyId": "mpolicy-default-auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_072" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid CredentialType, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "asvgasfbkasdm", "credentialType": "auth", "policyId": "mpolicy-default-auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_InValid_policyId, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "credentialType": "auth", "policyId": "asrhtaeh" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid PolicyId, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_MapTo_Inactive_Policy_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "MISP3", "credentialType": "auth", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PMP_016" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid inactive Policy, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_Map_Again_Dublicate_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111999", "credentialType": "auth", "policyId": "mosip policy" }, output={ "errors": [ { "errorCode": "PMS_PRT_007" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner while keeping duplicate PartnerId, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyforMappedPartnerAndCredentialtype_AllValid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "credentialType": "auth" }, output={ "partnerId": "pms-111999", "credentialType": "auth", "policyName": "mosip policy" }, inputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtype, outputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtypeResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy for MappedPartner and CredentialType Partner, uniqueIdentifier=TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyforMappedPartnerAndCredentialtype_InValid_credentialType, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies, role=partner, templateFields=null, input={ "partnerId": "MOVP-AUTOMATION", "credentialType": "asfgr" }, output={ "errors": [ { "errorCode": "PMS_PRT_064" } ] }, inputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtype, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy for MappedPartner and CredentialType Partner while keeping invalid CredentialType, uniqueIdentifier=TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyforMappedPartnerAndCredentialtype_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies, role=partner, templateFields=null, input={ "partnerId": "asdg", "credentialType": "auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_064" } ] }, inputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtype, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy for MappedPartner and CredentialType Partner while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRoles_allValid_smoke, endPoint=/v1/partnermanager/roles, role=partner, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetRoles/getRoles, outputTemplate=pms/GetRoles/getRolesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all Partner Roles, uniqueIdentifier=TC_PMS_GetRoles_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_activate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MISP-AUTOMATION", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Activated Partner as Activate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_MISP3, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MISP3", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated MISP Partner as Deactivate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_Tech-1233, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "Tech-1233", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated Tech-1233 Partner as Deactivate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_Tech_321, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "Tech-321", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated Tech-321 Partner as Deactivate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MOVP-AUTOMATION", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated Partner as Deactivate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "asdfgrwg", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PMP_005" } ] }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated Partner as Deactivate for Invalid PartnerID, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetApiKeyRequests_allValid_smoke, endPoint=/v1/partnermanager/partners/apikey, role=partner, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetApiKeyRequests/getApiKeyRequests, outputTemplate=pms/GetApiKeyRequests/getApiKeyRequestsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve ApiKeyRequests for Partner, uniqueIdentifier=TC_PMS_GetApiKeyRequests_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=SELECT module_name,cr_by FROM audit.app_audit_log where module_name LIKE '%partner%' order by action_dtimes desc LIMIT 5, role=audit, templateFields=[partnerQuery, partner service], input={ }, output={ "module_name": "partner service" "cr_by": "111997" }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get the AuditLogs for add contact scenario, uniqueIdentifier=TC_PMS_addContact_01 |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyForApiKey_InValid_apiKey, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}, role=partner, templateFields=null, input={ "partnerId": "110124", "apiKey": "dhbg" }, output={ "errors": [ { "errorCode": "PMS_PMP_009" } ] }, inputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy API Key while keeping invalid APIKey, uniqueIdentifier=TC_PMS_GetPolicyForApiKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyForApiKey_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}, role=partner, templateFields=null, input={ "partnerId": "fqgfg", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$" }, output={ "errors": [ { "errorCode": "PMS_PMP_009" } ] }, inputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy API Key while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_GetPolicyForApiKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyForApiKey_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$" }, output={ "partnerID": "pms-111999" }, inputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKey, outputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy API Key, uniqueIdentifier=TC_PMS_GetPolicyForApiKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyAgainstApiKey_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_id$", "newPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Against ApiKey with valid details, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_OldPolicyId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "asfbgt", "newPolicyID": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_50" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Against ApiKey with invalid OldPolicyId, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_apiKey, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "apiKey": "asvbgn", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "newPolicyID": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_50" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Against ApiKey with invalid ApiKey, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_newPolicyId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "newPolicyID": "INVALID", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_014" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Against ApiKey with invalid NewPolicyId, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "asgfdg", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "newPolicyID": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_50" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Against ApiKey with invalid PartnerId, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=SELECT module_name,cr_by FROM audit.app_audit_log where module_name LIKE '%partner%' order by action_dtimes desc LIMIT 5, role=audit, templateFields=[partnerQuery, partner service], input={ }, output={ "module_name": "partner service" "cr_by": "111997" }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get the AuditLogs for add contact scenario, uniqueIdentifier=TC_PMS_addContact_01 |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroupForPartner_AllValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "updatepolicy", "policygroupName": "mosip policy group" }, output={ "response": "$IGNORE$" }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartnerResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group For Partner with valid data, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroupForPartner_InValid_ApprovedPartner, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "pms-111998", "policygroupName": "mosip policy group 19234" }, output={ "errors": [ { "errorCode": "PMS_PRT_050" } ] }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group For Partner with invalid Approved Partner, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroupForPartner_InValid_PolicyGroup, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "updatepolicy", "policygroupName": "dsfgeagb" }, output={ "errors": [ { "errorCode": "PMS_PRT_002" } ] }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group For Partner with invalid Policy GroupId, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroupForPartner_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "asfvgb", "policygroupName": "mosip policy group updated" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group For Partner with invalid PartnerId, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=SELECT module_name,cr_by FROM audit.app_audit_log where module_name LIKE '%partner%' order by action_dtimes desc LIMIT 5, role=audit, templateFields=[partnerQuery, partner service], input={ }, output={ "module_name": "partner service" "cr_by": "111997" }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get the AuditLogs for add contact scenario, uniqueIdentifier=TC_PMS_addContact_01 |
| Testcase Input |
|---|
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_APIKEY, endPoint=SELECT * FROM ida.api_key_data where, role=partner, templateFields=null, input={ "partner_id": "$REMOVE$", "policy_name": "$REMOVE$", "api_key_id": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "license_key": "$REMOVE$" }, output={ "module_name": "partner service", "cr_by": "Tech-123" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data in database using APIKEY with valid details, uniqueIdentifier=TC_PMS_DBValidator_03 |
| Testcase Input |
|---|
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_Misp, endPoint=SELECT * FROM ida.misp_license_data where, role=partner, templateFields=null, input={ "partner_id": "$REMOVE$", "policy_name": "$REMOVE$", "api_key_id": "$REMOVE$", "license_key": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKey$" }, output={ "module_name": "partner service", "cr_by": "pms-111555" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data in database using MISPLicense with valid details, uniqueIdentifier=TC_PMS_DBValidator_04 |
| Testcase Input |
|---|
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_PMS, endPoint=SELECT * FROM ida.partner_data where, role=partner, templateFields=null, input={ "partner_id": "pms-111999", "policy_name": "$REMOVE$", "api_key_id": "$REMOVE$", "license_key": "$REMOVE$" }, output={ "module_name": "partner service", "cr_by": "111997" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data in database using PMS with valid details, uniqueIdentifier=TC_PMS_DBValidator_01 |
| Testcase Input |
|---|
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_Policy, endPoint=SELECT * FROM ida.policy_data where, role=partner, templateFields=null, input={ "partner_id": "$REMOVE$", "policy_name": "mosip data share policy", "api_key_id": "$REMOVE$", "license_key": "$REMOVE$" }, output={ "module_name": "partner service", "cr_by": "111997" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data in database using Policy with valid details, uniqueIdentifier=TC_PMS_DBValidator_02 |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicense_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicenseResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with valid Access Token, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicense_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicense_Without_PolicyId, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_without_PolicyID_sid_partnerId$", "policyId": "$REMOVE$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicenseResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License without PolicyId, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicense_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicense_with_valid_LicenseKeyName, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicenseResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with valid License Key Name, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicense_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicense_with_valid_PolicyId, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicenseResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with valid PolicyId, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicense_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_Invalid_Access_Token_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License without Access Token, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_ExpiryDate_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "" }, output={ "errors": [ { "errorCode": "PMS_MSP_436" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with empty expiry date, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_LicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_422" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with empty LicenseKeyName, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with Empty RequestTime, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_Request_id_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with Empty ExpiryDate field, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Existing_LicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_424" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with existing LicenseKeyName, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_ExpiryDate_Less_Than_Current_Date_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2025-09-08" }, output={ "errors": [ { "errorCode": "PMS_MSP_425" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with expiry date less than current date, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_PartnerID_Format_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-@@111555", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_439" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with Invalid PartnerID format, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_PartnerID_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-invalid", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_439" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with Invalid PartnerID, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_RequestTime_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "invalid-requesttime", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "2035-10-10" }, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with Invalid RequestTime, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_Request_id_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "invalid-id", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with Invalid Request id, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_Version_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "invalid-version", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with Invalid Version, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_LicenseKeyName_Exceeding_Max_Length_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "MISP_API_Automation_License_Key_ThisLicenseKeyNameIsExceedingTheMaximumAllowedLengthWhichIsExpectedToBeLessThanOrEqualToFiftyCharacters_$TIMESTAMP$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_435" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with licenseKeyName exceeding maximum allowed length, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Missing_ExpiryDate_Field_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_436" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with missing ExpiryDate field, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Missing_LicenseKeyName_Field_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_422" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with missing LicenseKeyName field, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Missing_RequestTime_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with missing RequestTime, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_NotApproved_PolicyID_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "notapproved-policyId", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_439" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with Not Approved PolicyID, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_SpecialCharacter_In_LicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "MISP@#%$^&*!_License_Key11", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with special character in LicenseKeyName, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_SpecialCharacter_In_PolicyID_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "453@@677", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ "errors": [ { "errorCode": "PMS_MSP_439" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Regenerating MISP Partner License with special character in PolicyID, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateMISPPartnerLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicenseResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating the MISP Partner License using a valid access token., uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicense_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Empty_PolicyId_And_LicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "", "licenseKeyName": "", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating MISP Partner License with Empty PolicyId and LicenseKeyName, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Empty_PolicyId_And_Status_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "" }, output={ "errors": [ { "errorCode": "PMS_MSP_433" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating MISP Partner License with Empty PolicyId and Status, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Empty_PolicyId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating MISP Partner License with Empty PolicyId, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Id_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "invalid_id", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating MISP Partner License with invalid Id, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_PolicyId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "invalid_policyId", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating MISP Partner License with invalid PolicyId, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Status_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "invalid_status" }, output={ "errors": [ { "errorCode": "PMS_MSP_433" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating MISP Partner License with invalid Status, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Token_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "invalid_license_key_name", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating MISP Partner License with invalid Access Token, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Version_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "invalid_version", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating MISP Partner License with invalid Version, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_without_Access_Token_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating MISP Partner License with invalid Access Token, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_without_PartnerId_Field_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "responseCode": "404" }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating MISP Partner License without PartnerId Field, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid_id$", "status": "De-Activate" }, output={ }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/DeactivateDevice/DeactivateDeviceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device, uniqueIdentifier=TC_PMS_DeactivateDevice_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_Already_deactivated_device_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_014" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device which has been already Deactivated, uniqueIdentifier=TC_PMS_DeactivateDevice_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_Empty_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$REMOVE$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device while keeping requestTime paramter as Empty, uniqueIdentifier=TC_PMS_DeactivateDevice_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_Missing_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device while keeping requestTime paramter as Missing, uniqueIdentifier=TC_PMS_DeactivateDevice_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Empty_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.device.patch", "version": "$REMOVE$", "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDeviceNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device while keeping Version parameter as Empty, uniqueIdentifier=TC_PMS_DeactivateDevice_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "APPLE1111222" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passing invalid Device ID, uniqueIdentifier=TC_PMS_DeactivateDevice_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_RandomDevice_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "00001111222" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passwing invalid Random Device ID, uniqueIdentifier=TC_PMS_DeactivateDevice_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.device.patch", "version": "99", "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDeviceNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passing invalid Version, uniqueIdentifier=TC_PMS_DeactivateDevice_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "1111-07-22T08:21:17.665Z", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passing invalid requestTime, uniqueIdentifier=TC_PMS_DeactivateDevice_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_without_authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=invalidtoken, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device without Partner authentication, uniqueIdentifier=TC_PMS_DeactivateDevice_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_all_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI along with Associated Devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Already_deactivated_SBI_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_020" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI which already Deactivated in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping ID parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping requestTime parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_InvalidNumeric_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "0101022" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Invalid Numeric values in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "JSKSKA56888", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI by passing Invalid ID parameter in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "APPLEMANCAP" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Invalid values in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as invalid value 0 in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as invalid value 1 in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "9977", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as invalid values in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "1111-07-22T08:21:17.665Z", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Request Time parameter as invalid in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Keeping_IDas_Null_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "Null", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping ID parameter as Null in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping ID parameter as Missing in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "$REMOVE$", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI without Version parameter in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$REMOVE$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping requestTime parameter as Missing in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Null_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "Null" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Null in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Null_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "Null", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as Null in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Space_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": " " }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Without_Authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=invalidtoken, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI with associated Devices without Partner authentication, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_with_invalid_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=device, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI with invalid Partner roles, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_whenSBIisDeactivated_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_029" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve Mapping Device To Sbi when SBI is Deactivated, uniqueIdentifier=TC_PMS_ApproveMappingDevice_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "status": "approved", "isActive": true }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/DeactivateFtm/DeactivateFtmResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device with valid Partner authentication, uniqueIdentifier=TC_PMS_DeactivateFtm_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Already_Deactivate_FTM_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_007" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating the FTM which is already Deactivated and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "" }, output={ "responseCode": "404" }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Empty and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_Req_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM keeping ID parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestTime parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_Values_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "Apple0192938838" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Invalid values and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid value 0 in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid value 1 in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_Version_Num_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "9977", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid values in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "1111-07-22T08:21:17.665Z", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Request Time parameter as invalid in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Keeping_Req_IDas_Null_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "Null", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestID parameter as Null in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Missing_Req_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM with the requestID parameter missing in the request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Missing_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Missing in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Missing_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$REMOVE$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestTime parameter as Missing in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Null_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "Null" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Null and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Null_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "Null", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Null in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_with_SpaceValue_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": " " }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Missing and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=invalidtoken, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM without Partner authentication and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalFtmCertifacte_AfterDeactiveFtm_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_009", "message": "Cannot download the certificate for a deactivated FTM" } ] }, inputTemplate=pms/GetOriginalFtmCertifacteAfterDeactiveFtm/GetOriginalFtmCertifacteAfterDeactiveFtm, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Original Ftm Certifacte After Deactivate Ftm, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteAfterDeactiveFtm_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_After_Publish_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output= { }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/DeactivatePolicy/DeactivatePolicyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy, uniqueIdentifier=TC_PMS_deactivate_policy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_WithRejectedPolicy_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_For_Reject_Policy_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output= { }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/DeactivatePolicy/DeactivatePolicyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with rejected policy, uniqueIdentifier=TC_PMS_deactivate_policy_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_already_deactivated, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_062" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy which is already deactiavted, uniqueIdentifier=TC_PMS_deactivate_policy_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_invalid_policyId, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "hhggtt567", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_065" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with invalid policyid, uniqueIdentifier=TC_PMS_deactivate_policy_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_invalid_policyId_spaces, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": " ", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with only spaces as policyid, uniqueIdentifier=TC_PMS_deactivate_policy_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_invalid_roles, endPoint=/v1/policymanager/policies/{policyId}, role=POLICYMANAGER, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy authenticated with invalid roles, uniqueIdentifier=TC_PMS_deactivate_policy_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_with_DraftPolicy_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_For_Draft_Policy_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_072" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with draft policy requests, uniqueIdentifier=TC_PMS_deactivate_policy_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_with_InProgressPolicy_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_For_InProgressMapping_Policy_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_064" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with draft policy requests, uniqueIdentifier=TC_PMS_deactivate_policy_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_with_approved_policyrequests, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_063" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with approved policy requests, uniqueIdentifier=TC_PMS_deactivate_policy_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_authentication, endPoint=/v1/policymanager/policies/{policyId}, role=invalidtoken, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without authentication, uniqueIdentifier=TC_PMS_deactivate_policy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_id, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "$REMOVE$", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without id, uniqueIdentifier=TC_PMS_deactivate_policy_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_requestime, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$REMOVE$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_version, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without version, uniqueIdentifier=TC_PMS_deactivate_policy_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output= { "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group, uniqueIdentifier=TC_PMS_deactivate_policy_group_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_future_date_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "2026-01-24T07:47:57.206Z", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with future date given as requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_group_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_id_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.deactiavte", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with invalid id value, uniqueIdentifier=TC_PMS_deactivate_policy_group_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_policygroupid_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "6776654" }, output={ "errors": [ { "errorCode": "PMS_POL_068" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group invalid policygroupid, uniqueIdentifier=TC_PMS_deactivate_policy_group_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_roles_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=POLICYMANAGER, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group authenticated using invalid roles, uniqueIdentifier=TC_PMS_deactivate_policy_group_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_status_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_073" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with invalid status, uniqueIdentifier=TC_PMS_deactivate_policy_group_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_version_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "2.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group invalid version, uniqueIdentifier=TC_PMS_deactivate_policy_group_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_past_date_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "2024-01-24T07:47:57.206Z", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with past date given as requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_group_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_spacevalue_policygroupid_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": " " }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without policygroupid, uniqueIdentifier=TC_PMS_deactivate_policy_group_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_with_Draftpolicy_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_070" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with draft policy, uniqueIdentifier=TC_PMS_deactivate_policy_group_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_with_deactivated_policies, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid_id$" }, output={ "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with deactivated policies, uniqueIdentifier=TC_PMS_deactivate_policy_group_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_with_publishpolicy_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_056" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with published policy, uniqueIdentifier=TC_PMS_deactivate_policy_group_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_authentication_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=invalidtoken, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without authentication, uniqueIdentifier=TC_PMS_deactivate_policy_group_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_id_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without id value, uniqueIdentifier=TC_PMS_deactivate_policy_group_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_requesttime_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$REMOVE$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_group_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_status_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "$REMOVE$", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_073" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without status, uniqueIdentifier=TC_PMS_deactivate_policy_group_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_version_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without version, uniqueIdentifier=TC_PMS_deactivate_policy_group_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_GetAllNotifications_UsingPartnerToken_FilteredByNotificationTypeRoot_Neg, endPoint=/v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4, role=partnerftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_006" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by using Partner Token and filtered by Notification Type Root, uniqueIdentifier=TC_PMS_GetAllNotifications_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_GetAllNotifications_by_filtering_CertificateID_without_selecting_NotificatioType_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&certificateId=fd0e8be0-9499-448e-9b85-06d5649c3f0e, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering CertificateID without selecting NotificatioType filter, uniqueIdentifier=TC_PMS_GetAllNotifications_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_All_Valid_Smoke, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Different_Time_Format_Created_From_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=07-04-2025, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_025" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering different format Created From Date, uniqueIdentifier=TC_PMS_GetAllNotifications_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Different_Time_Format_Created_To_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=07-04-2025, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_026" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering different format Created To Date, uniqueIdentifier=TC_PMS_GetAllNotifications_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Different_Time_Format_Expiry_Date, endPoint=/v1/partnermanager/notifications?pageSize=16&expiryDate=07-04-2025, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_016" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering different format Expiry Date, uniqueIdentifier=TC_PMS_GetAllNotifications_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_ApiKey_Invalid_ftmChipType_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&apiKeyName=12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_020" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications by selecting Api key name label and selecting NotificationType as ftmChip, uniqueIdentifier=TC_PMS_GetAllNotifications_38 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Invalid_NotificationType_invalid_partnerDomain_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&partnerDomain=AUTH, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_021" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications by selecting sbi Id and selecting NotificationType as ftmChip, uniqueIdentifier=TC_PMS_GetAllNotifications_41 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_PageNo_2_Neg, endPoint=/v1/partnermanager/notifications?pageSize=2, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsPageNoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all notifications invalid PageNo, uniqueIdentifier=TC_PMS_GetAllNotifications_35 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Page_Size4_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering page size 4, uniqueIdentifier=TC_PMS_GetAllNotifications_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Page_Size8_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering page size 4, uniqueIdentifier=TC_PMS_GetAllNotifications_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Root_Certificates_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only Root certificate notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_SbiID_without_notificationType_Neg, endPoint=/v1/partnermanager/notifications?sbiId=PMS-SBI, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all ftmChip without selecting notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Status_Active_Notifications, endPoint=/v1/partnermanager/notifications?notificationStatus=active&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only Active certificate notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Status_Dismissed_Notifications, endPoint=/v1/partnermanager/notifications?notificationStatus=active&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only Dismissed certificate notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Weekly_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=weekly&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only Weekly summary notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_ftmChip_Invalid_apikeyType_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&ftmId=12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_022" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications by selecting ftmChip Id and selecting NotificationType as sbi, uniqueIdentifier=TC_PMS_GetAllNotifications_39 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_ftmChip_without_notificationType_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all ftmChip without selecting notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_PageNo_Neg, endPoint=/v1/partnermanager/notifications?pageNo=-4, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications with invalid pageNo, uniqueIdentifier=TC_PMS_GetAllNotifications_36 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_PageSize_Neg, endPoint=/v1/partnermanager/notifications?pageSize=-22, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications with invalid pageNo, uniqueIdentifier=TC_PMS_GetAllNotifications_37 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_SbiID_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all SBI Chip with invalid data, uniqueIdentifier=TC_PMS_GetAllNotifications_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_SbiVersionValues_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=_%2ASBI, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all SBI Chip with invalid SBI Version data, uniqueIdentifier=TC_PMS_GetAllNotifications_34 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_SbiVersion_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=ab-102-13881, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all SBI Chip with invalid SBI Version data, uniqueIdentifier=TC_PMS_GetAllNotifications_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_ftmId_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&ftmId=342342, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all FTM Chip with invalid data, uniqueIdentifier=TC_PMS_GetAllNotifications_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_make_model_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all ftmChip with make & model data, uniqueIdentifier=TC_PMS_GetAllNotifications_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_policyName_Neg, endPoint=/v1/partnermanager/notifications?policyName=PMS-test, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all policyName with invalid data, uniqueIdentifier=TC_PMS_GetAllNotifications_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_policyName_invalid_notificationType_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&policyName=PMS-test, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_020" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all policyName by selecting invalid notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_policyName_without_notificationType_Neg, endPoint=/v1/partnermanager/notifications?policyName=PMS-test, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all policyName without selecting notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_sbiId_Invalid_ftmChip_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&sbiId=12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_023" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications by selecting sbi Id and selecting NotificationType as ftmChip, uniqueIdentifier=TC_PMS_GetAllNotifications_40 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_For_IntermediateType_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=weekly&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only IntermediateType certificate notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_For_RootType_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only RootType certificate notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Invalid_Certificate_ID_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=8&certificateId=777apple123, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering invalid certificate ID, uniqueIdentifier=TC_PMS_GetAllNotifications_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Invalid_Created_From_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=123456, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_025" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering invalid Created From Date, uniqueIdentifier=TC_PMS_GetAllNotifications_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Invalid_Created_To_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=928382, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_026" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering invalid Created To Date, uniqueIdentifier=TC_PMS_GetAllNotifications_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Invalid_Expiry_Date, endPoint=/v1/partnermanager/notifications?pageSize=16&expiryDate=881718821, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_016" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering invalid Expiry Date, uniqueIdentifier=TC_PMS_GetAllNotifications_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_by_filtering_IssuedBy_without_selecting_NotificatioType_Neg, endPoint=/v1/partnermanager/notifications?pageSize=16&issuedBy=mosip, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering IssuedBy without selecting NotificatioType filter, uniqueIdentifier=TC_PMS_GetAllNotifications_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_by_filtering_IssuedTo_without_selecting_NotificatioType_Neg, endPoint=/v1/partnermanager/notifications?pageSize=4&issuedTo=mosip, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering IssuedTo without selecting NotificatioType filter, uniqueIdentifier=TC_PMS_GetAllNotifications_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_invalid_apiKeyName_Neg, endPoint=/v1/partnermanager/notifications?notificationType=apikey&apiKeyName=%2APMS121, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all API key expiry notifications that with invalid API key name, uniqueIdentifier=TC_PMS_GetAllNotifications_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_without_Authorization_Token_Neg, endPoint=/v1/partnermanager/notifications, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications without Authorization Token, uniqueIdentifier=TC_PMS_GetAllNotifications_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_without_Partner_Admin_Role_Neg, endPoint=/v1/partnermanager/notifications, role=auth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications without partner admin role, uniqueIdentifier=TC_PMS_GetAllNotifications_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Empty_Notification_Status_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_012" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Empty Notification Status, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Empty_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Empty Request ID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1", "requesttime": "", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Empty Request Time param, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_NotificationID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": "fd0e8", "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_008" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Invalid NotificationID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_Notification_Status_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "CANCEL" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_012" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with invalid Notification status, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_Param_Dismiss_Notification_Status_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "DISMISS" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_012" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with invalid Notification Status parameter as DISMISS, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with invalid Request ID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_Value_0_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Version value 0 parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_Value_1_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Version value 1 parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "12345", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Version parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Null_NotificationID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": "NULL", "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_008" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Null NotificationID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Null_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Null Request ID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Null_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "Null", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Version parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Without_Authentication_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": "fd0e8be0-9499-448e-9b85-06d5649c3f0e", "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification without Authentication, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Without_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification without Request ID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Without_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Version parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_without_Object_Parameter_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_019" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification without object Parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_without_PartnerAdmin_Role_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=auth, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification without Partner Admin role, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_without_RequestTime_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification without RequestTime parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_All_Valid_Smoke, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestampResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with valid details, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestamp_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Empty_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Empty RequestId param, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": " ", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Empty RequestTime, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Empty_notificationsSeenDtimes_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": " ", "userId": "pms-111999" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Empty notificationsSeenDtimes parameter, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_Partner_Admin_Role_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=auth, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with Invalid partner admin role, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with Invalid RequestId param, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_Version_Value_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1010", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Invalid Version value, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_userId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "base-admin" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with invalid userID, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Null_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "Null", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Null RequestId param, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Null_Version_Value_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "Null", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Null Version value, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Null_userId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "Null" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with Null userID, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Version_Value0_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Version value0, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Version_Value1_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Version value1, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Without_Authentication_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp without Authentication, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Without_Version_Value_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp without Version value, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_with_Partner_Role_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with Invalid partner admin role, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_without_Object_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "$REMOVE$", "userId": "pms-111999" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp without Object parameter, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_without_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp without RequestId param, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_without_RequestTime_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp without RequestTime, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetNotificationsSeenTimestamp_All_Valid_Smoke, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "userId": "pms-111999" }, output= { }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestampResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Notifications Seen Timestamp, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestamp_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetNotificationsSeenTimestampNegativeScenarios_Invalid_userId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "userId": "base-admin" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Notifications Seen Timestamp with invalid userId, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetNotificationsSeenTimestampNegativeScenarios_with_InvalidToken_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=invalidtoken, templateFields=null, input={ "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Notifications Seen Timestamp with invalid token, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetNotificationsSeenTimestampNegativeScenarios_without_AdminRole_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=auth, templateFields=null, input={ "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Notifications Seen Timestamp without Adminrole, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "30" }, output={ "partnerId": "pms-111998", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificates, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificate_Expiry_Date_10_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "10" }, output={ "partnerId": "pms-111998", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificate with Expiry date 10 days, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificate_Expiry_Date_15_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "15" }, output={ "partnerId": "pms-111998", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificate with Expiry date 15 days, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificate_Expiry_Days_30_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "30" }, output={ "partnerId": "pms-111998", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificate with Expiry date 30 days, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Role_Neg, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=device, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificates with invalid Role, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=invalidtoken, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificates with invalid token, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "30" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root and Intermediate Expiring Certificates, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_10_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "10" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root and Intermediate Expiring Certificates, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_15_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "15" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root and Intermediate Expiring Certificates, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_30_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "30" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root and Intermediate Expiring Certificates, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Token_Neg, endPoint=/v1/partnermanager/trust-chain-certificates, role=invalidtoken, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetRootIntermediateExpiringCertificateRootIntermediate/GetRootIntermediateExpiringCertificateRootIntermediate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root Intermediate Expiring Certificates with invalid token, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRootIntermediateExpiringCertificateNegativeScenarios_Partner_Role_Neg, endPoint=/v1/partnermanager/trust-chain-certificates, role=partnerftm, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetRootIntermediateExpiringCertificateRootIntermediate/GetRootIntermediateExpiringCertificateRootIntermediate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root Intermediate Expiring Certificates with Partner Role, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartnerV2_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner by Partner Admin token, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Auth_Partner_Token_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_ByPageNo, endPoint=/v1/partnermanager/partner-api-keys/v2?pageNo=2&pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "2" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2PageNoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by pageNo, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_10_days, endPoint=/v1/partnermanager/partner-api-keys/v2?expiryPeriod=10, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Expiry period 10 days, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_15_days, endPoint=/v1/partnermanager/partner-api-keys/v2?expiryPeriod=15, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Expiry period 15 days, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_30_days, endPoint=/v1/partnermanager/partner-api-keys/v2?expiryPeriod=30, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Expiry period 30 days, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Status_Activated, endPoint=/v1/partnermanager/partner-api-keys/v2?status=activated, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Status Activated, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Status_Dectivated, endPoint=/v1/partnermanager/partner-api-keys/v2?status=deactivated, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Status Deactivated, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_apiKeyLabel, endPoint=/v1/partnermanager/partner-api-keys/v2?apiKeyLabel=s, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by apiKeyLabel, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_orgName, endPoint=/v1/partnermanager/partner-api-keys/v2?orgName=PMS, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by orgName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_pageSize, endPoint=/v1/partnermanager/partner-api-keys/v2?orgName=PMS, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by pageSize, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_partnerID, endPoint=/v1/partnermanager/partner-api-keys/v2?partnerId=pms-111999, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by partnerId, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_policyGroupName, endPoint=/v1/partnermanager/partner-api-keys/v2?policyGroupName=mosip, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by policyGroupName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_policyName, endPoint=/v1/partnermanager/partner-api-keys/v2?policyName=mosip, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by policyName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_sortFieldName_sortType_ASC, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by sortFieldName and sortType Ascending, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_sortFieldName_sortType_DESC, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by sortFieldName and sortType Descending, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_DevicePartner_Token_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerdevice, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Device Partner token, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_FTMPartner_Token_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by FTM Partner token, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_WithoutPageNo_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invaid_Role_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=admin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_apiKeyLabel_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?apiKeyLabel=InvalidAPIKey, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2TotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid apiKeyLabel, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_orgName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?orgName=%2APMS-1100, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid orgName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_pageNo_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?pageNo=-22&pageSize=2, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid pageNo, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_pageSize_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?pageNo=1&pageSize=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid pageSize, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_partnerID_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?partnerId=%252APMS, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid partnerId, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_policyGroupName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?policyGroupName=testmosip12121, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2TotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid policyGroupName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_policyName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?policyName=testmosip1212, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2TotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid policyName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_sortFieldName_1_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=_partnerID&sortType=asc&pageNo=1&pageSize=1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=MOSIP_PMS, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by sortFieldName and without selecting pageno & pageSize, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_without_Authentication_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner without Authentication for Partner Admin, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_01 |
| Messages |